Sciweavers

28 search results - page 3 / 6
» New Covert Channels in HTTP
Sort
View
ICON
2007
IEEE
14 years 2 days ago
An Empirical Evaluation of IP Time To Live Covert Channels
—Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative act...
Sebastian Zander, Grenville J. Armitage, Philip Br...
DSN
2008
IEEE
14 years 7 days ago
TCP covert timing channels: Design and detection
Exploiting packets’ timing information for covert communication in the Internet has been explored by several network timing channels and watermarking schemes. Several of them em...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 5 months ago
Covert Channels in SIP for VoIP signalling
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (V...
Wojciech Mazurczyk, Krzysztof Szczypiorski
IJNSEC
2007
194views more  IJNSEC 2007»
13 years 5 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
IEEEMSP
2002
IEEE
177views Multimedia» more  IEEEMSP 2002»
13 years 10 months ago
Data masking: a secure-covert channel paradigm
— It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypt...
Regunathan Radhakrishnan, Kulesh Shanmugasundaram,...