نتایج جستجو برای: covert channel

تعداد نتایج: 228225  

2008
Steffen Wendzel

Covert channel techniques are used by attackers to transfer data in a way prohibited by the security policy. There are two main categories of covert channels: timing channels and storage channels. This paper introduces a new storage channel technique called protocol channels. A protocol channel switches one of at least two protocols to send a bit combination to a destination. The main goal of a...

2006
Sebastian Zander Grenville Armitage Philip Branch

Covert channels are used for the secret transfer of information. Unlike encryption, which only protects the information from unauthorised observers, covert channels aim to hide the very existence of the communication. The huge amount of data and vast number of different network protocols in the Internet makes it an ideal high-capacity vehicle for covert communication. Covert channels pose a ser...

2006
Joon Son Jim Alves-Foss

Real-time systems must satisfy timing constraints. In our previous work, we showed that a covert timing channel cannot be completely closed in some system configurations due to the timing constraints imposed by the RateMonotonic (RM) real-time scheduling algorithm. In this paper, we construct a probabilistic model to measure two quantities of a covert timing channel in RM based systems: channel...

Journal: :CoRR 2015
Bushra Aloraini Daryl Johnson Bill Stackpole Sumita Mishra

smartphones has become increasingly important as smartphones have recently replaced the role of traditional computers. Smartphones are subject to traditional computer network covert channel techniques. Smartphones also introduce new sets of covert channel techniques as they add more capabilities and multiple network connections. This work presents a new network covert channel in smartphones. Th...

2006
Bei Wang Jim Alves-Foss

The use of security policy enforcement mechanisms has been a topic in recent literature. Particular focus has been on the class of policies that can be enforced by these mechanisms but not on the security policy guiding the execution of the monitoring mechanisms. It has been a challenge to enforce information confidentiality in a multi-level secure system since malicious users can exploit cover...

2017
Olga Chen Catherine A. Meadows Gautam Trivedi

This paper is a survey of both methods that could be used to support stealthy communication over both wired and wireless networks and techniques for evaluating them. By stealthy communication we mean communication using channels that guarantee that the nature of the communication, or even the fact that communication is taking place at all, is hidden. Although stealthy communication and informat...

Journal: :CoRR 2017
AmirEmad Ghassami Ali Yekkehkhany Negar Kiyavash Yi Lu

We study a covert queueing channel between two users sharing a round robin scheduler. Such a covert channel can arise when users share a resource such as a computer processor or a router arbitrated by a round robin policy. We present an information-theoretic framework to model and derive the maximum reliable data transmission rate, i.e., the capacity of this channel for both noiseless and noisy...

2006
Zbigniew Kotulski Wojciech Mazurczyk

In this paper a new way of exchanging information for Voice over Internet Protocol (VoIP) service is presented. With use of digital watermarking and steganography techniques we achieve a covert channel which can be used for different purposes e.g. to improve IP Telephony security or to alternate existing protocols like RTCP (Real-Time Control Protocol). Main advantage of this solution is that i...

2016
Aswini S Palani Raja

A Malware is a very big threat in today’s computing world. It continues to grow in volume and evolve in complexity. Modern malware uses advanced techniques to hide from static and dynamic analysis tools. The existing system uses classification based and regression based approach for detection. The proposed system utilizes the classification based approach and regression based approach for detec...

2006
Serdar Cabuk C. W. Clifton N. B. Shroff V. Balakrishnan

Cabuk, Serdar Ph.D., Purdue University, December, 2006. Network Covert Channels: Design, Analysis, Detection, and Elimination. Major Professors: Carla E. Brodley and Eugene H. Spafford. Indirect communication channels have been effectively employed in the communications world to bypass mechanisms that do not permit direct communication between unauthorized parties. Such covert channels emerge a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید