Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
We provide a performance evaluation framework, and quantify the threat to users. Our results demonstrate that covert channels represent an immediate threat to ...
An Assessment of VoIP Covert Channel Threats. Takehiro Takahashi. School of Computer Science. Georgia Institute of Technology. Atlanta, Georgia 30332. Email ...
This paper presents a model of VoIP covert channels that explains their main components and functions, and provides a performance evaluation framework, ...
People also ask
Applications of the. VoIP covert channels differ as they can pose a threat to the network communication or can be used to improve the functioning of VoIP ...
Threat model, design and implementation. In this section, we first describe the considered threat model followed by the design and implementation details.
In this paper, possible covert channels via VoIP are analyzed, and an effective countermeasure to detect hidden messages in both SEQ (Sequence Number) and SSRC ...
Abstract—A covert channel is a communication channel that allows parties to communicate and transfer data indirectly. Covert channel types are storage, ...
Takahashi, T., Lee, W.: An Assessment of VoIP Covert Channel Threats. In: Proc. of 3rd International Conference on Security and Privacy in Communication ...
serious security threats. We have then described the existing covert channel techniques and the countermeasures used to detect, eliminate, or limit the ...
channel is more dangerous as it may lead to the confidential information leakage. It is hard to assess what bandwidth of covert channel poses a serious threat.