نتایج جستجو برای: covert channel
تعداد نتایج: 228225 فیلتر نتایج به سال:
Surveillance performance is studied for a wireless eavesdropping system, where full-duplex legitimate monitor eavesdrops suspicious user's link with artificial noise (AN) assistance. Different from the existing works, receiver assumed to be capable of detecting presence AN. Once such detects AN, user will stop transmission, which can therefore degrade surveillance performance. Hence, improve pe...
Concurrency control is important for multilevel secure databases because a covert channel can be easily created through collaboration of multilevel transactions in most traditional concurrency control mechanisms. We, in this paper, propose a secure multiversion concurrency control mechanism. We present concepts of an invisible area and a t-lock to prevent retrieval anomaly and starvation of hig...
This paper argues the need for providing a covert backchannel communication mechanism in authentication protocols, discusses various practical uses for such a channel, and desirable features for its design and deployment. Such a mechanism would leverage the current authentication channel to carry out the covert communication rather than introducing a separate one. The communication would need t...
This paper describes the integrity static analysis approach developed to support the justification of commercial off-the-shelf software (COTS) used in a safety-related system. The static analysis was part of an overall software qualification programme, which also included the work reported in our paper presented at Safecomp 2002 [1]. Integrity static analysis focuses on unsafe language construc...
We give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack. Techniques are organized according to affected layer and protocol. For every covert channel its data bandwidth is given.
Digitization of analogue signals has opened up new avenues for information hiding and the recent advancements in the telecommunication field has taken up this desire even further. From copper wire to fiber optics, technology has evolved and so are ways of covert channel communication. By “Covert” we mean “anything not meant for the purpose for which it is being used”. Investigation and detectio...
We present a theory of grammar based on asymmetrical relations, the Strict Asymmetry Theory, and we provide evidence form Indo-European and non Indo-European languages to show that argument structure restrictions on morphological composition follow in a principled way from the theory. We describe and implement a bottom-up parser for morphological selection in the Strict Asymmetry framework. Cor...
This paper presents new methods enabling anonymous ommuni ation on the Internet. We des ribe a new proto ol that allows us to reate an anonymous overlay network by exploiting the web browsing a tivities of regular users. We show that the overlay network provides an anonymity set greater than the set of senders and re eivers in a realisti threat model. In parti ular, the proto ol provides unobse...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید