نتایج جستجو برای: covert channel

تعداد نتایج: 228225  

Journal: :IEEE Transactions on Communications 2021

Surveillance performance is studied for a wireless eavesdropping system, where full-duplex legitimate monitor eavesdrops suspicious user's link with artificial noise (AN) assistance. Different from the existing works, receiver assumed to be capable of detecting presence AN. Once such detects AN, user will stop transmission, which can therefore degrade surveillance performance. Hence, improve pe...

Journal: :INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2014

Journal: :Procedia Computer Science 2018

Journal: :Inf. Process. Lett. 1998
Heung-Taek Kim Myoung-Ho Kim

Concurrency control is important for multilevel secure databases because a covert channel can be easily created through collaboration of multilevel transactions in most traditional concurrency control mechanisms. We, in this paper, propose a secure multiversion concurrency control mechanism. We present concepts of an invisible area and a t-lock to prevent retrieval anomaly and starvation of hig...

2013
Mohammed H. Almeshekah Mikhail J. Atallah Eugene H. Spafford

This paper argues the need for providing a covert backchannel communication mechanism in authentication protocols, discusses various practical uses for such a channel, and desirable features for its design and deployment. Such a mechanism would leverage the current authentication channel to carry out the covert communication rather than introducing a separate one. The communication would need t...

2003
Peter G. Bishop Robin E. Bloomfield Tim Clement Sofia Guerra Claire Jones

This paper describes the integrity static analysis approach developed to support the justification of commercial off-the-shelf software (COTS) used in a safety-related system. The static analysis was part of an overall software qualification programme, which also included the work reported in our paper presented at Safecomp 2002 [1]. Integrity static analysis focuses on unsafe language construc...

2013
Boris Panajotov Aleksandra Mileva

We give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack. Techniques are organized according to affected layer and protocol. For every covert channel its data bandwidth is given.

Journal: :CoRR 2010
Khan Farhan Rafat Muhammad Sher

Digitization of analogue signals has opened up new avenues for information hiding and the recent advancements in the telecommunication field has taken up this desire even further. From copper wire to fiber optics, technology has evolved and so are ways of covert channel communication. By “Covert” we mean “anything not meant for the purpose for which it is being used”. Investigation and detectio...

2001
Anna Maria Di Sciullo Sandiway Fong

We present a theory of grammar based on asymmetrical relations, the Strict Asymmetry Theory, and we provide evidence form Indo-European and non Indo-European languages to show that argument structure restrictions on morphological composition follow in a principled way from the theory. We describe and implement a bottom-up parser for morphological selection in the Strict Asymmetry framework. Cor...

Journal: :CoRR 2004
Matthias Bauer

This paper presents new methods enabling anonymous ommuni ation on the Internet. We des ribe a new proto ol that allows us to reate an anonymous overlay network by exploiting the web browsing a tivities of regular users. We show that the overlay network provides an anonymity set greater than the set of senders and re eivers in a realisti threat model. In parti ular, the proto ol provides unobse...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید