Sciweavers

19 search results - page 1 / 4
» Experimental Results of Covert Channel Limitation in One-Way...
Sort
View
NDSS
1997
IEEE
13 years 9 months ago
Experimental Results of Covert Channel Limitation in One-Way Communication Systems
Nick Ogurtsov, Hilarie K. Orman, Richard Schroeppe...
ICICS
2004
Springer
13 years 10 months ago
Hydan: Hiding Information in Program Binaries
We present a scheme to steganographically embed information in x86 program binaries. We define sets of functionally-equivalent instructions, and use a key-derived selection proces...
Rakan El-Khalil, Angelos D. Keromytis
CCS
2004
ACM
13 years 10 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
ACSAC
2002
IEEE
13 years 10 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
ICC
2007
IEEE
13 years 11 months ago
PRML Detection of Multi-Level DVD Channels with Run-Length-Limited Modulation
Abstract— Multi-level optical recording using run-lengthlimited (RLL) modulation is a novel method to significantly increase the information recording density without changing o...
Hua Hu, Longfa Pan