نتایج جستجو برای: covert channel

تعداد نتایج: 228225  

Journal: :IEEE Computer 1998
Myong H. Kang Andrew P. Moore Ira S. Moskowitz

Developing a trustworthy system is difficult because the developer must construct a persuasive argument that the system conforms to its critical requirements. This assurance argument, as well as the software and hardware, must be evaluated by an independent certification team. In this paper, we present the external requirements and logical design of a specific trusted device, the NRL Pump, and ...

2008
Norka B. Lucena Grzegorz Lewandowski Steve J. Chapin

1. ABSTRACT Although as of today publicly-accessible Internet addresses are primarily IPv4, the adoption of the Internet Protocol version 6 (IPv6) is imminent, as shown in Figure 1 [1]. For example, the U.S. government established that all federal agencies must deploy IPv6 by June 2008 and news from the IPv6 Task Force reports significant progress in the adoption of IPv6 technology in other con...

2004
Steven J. Murdoch Piotr Zielinski

Collusion between partners in Contract Bridge is an oft-used example in cryptography papers and an interesting topic for the development of covert channels. In this paper, a different type of collusion is discussed, where the parties colluding are not part of one team, but instead are multiple independent players, acting together in order to achieve a result that none of them are capable of ach...

2016
Kevin Falzon Eric Bodden

The increased sharing of computational resources elevates the risk of side channels and covert channels, where an entity’s security is affected by the entities with which it is co-located. This introduces a strong demand for mechanisms that can effectively isolate individual computations. Such mechanisms should be efficient, allowing resource utilisation to be maximised despite isolation. In th...

2014
Steffen Wendzel Viviane Zwanger Michael Meier Sebastian Szlósarczyk

A building automation system (BAS) is the IT equipment within a building that monitors and controls the building (e.g., measuring temperature in a room to configure the heating level within the same room). We discuss the potential and the use of botnets in the context of BAS. Our botnet concept and scenario is novel in the sense that it takes advantage of the phyiscal capabilities of a building...

2005
Peter D. Blanck Robert Rosenthal Sara E. Snodgrass Bella M. DePaulo Miron Zuckerman

This study examined the developmental acquisition, defined both cross-sectionally and longitudinally, of females' superiority in decoding nonverbal cues. Three age groups (250 pre-high school students, 109 high school students, and 81 college students) were examined cross-sectionally, and 48 children 11-14 years old were examined longitudinally. Decoding of four types of nonverbal cues (face, b...

2005
Aram Galstyan Paul R. Cohen Marina del Rey

In this paper we study a classification model that mimics guilt by association. We consider a population consisting of known adversaries, covert adversaries, and benign individuals. In our model we associate a suspicion score with each individual. The scores for the covert and benign populations are initially set to 0, while the known adversaries have a fixed score of 1. The scores change dynam...

2017

Confidentiality, one of the primary goals of information security, is most frequently achieved utilizing cryptography. There exist other methods to conceal information from unauthorized or undesired viewers. One category of noncryptographic concealment techniques, called covert channels, can hide information locally on a system or mask traffic as it passes over a network. This report will explo...

2015
JingZheng Wu Yanjun Wu Bei Guan Yuqi Lin Samee Ullah Khan Nasro Min-Allah Yongji Wang

Data centers provides both the applications, systems software and the hardware as services over the Internet, which is named cloud computing [1–3]. It is core infrastructure of cloud computing, supporting dynamic deployment and elastic resource management. With the powerful computing and storing capabilities, cloud computing has become increasingly popular [4, 5]. The fundamental mechanism of c...

2012
Ruben Rios Jose Antonio Onieva Javier López

Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in multilevel security systems in the early 70’s they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications. We analyze a protocol extensively used today, the Dynamic Host Configuration Protocol (DHCP), in s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید