The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP links. In this paper we analyze Microsoft's Windows NT implementation of PPTP. We s...
AVR XMEGA is the recent general-purpose 8-bit microcontroller from Atmel featuring symmetric crypto engines. We analyze the resistance of XMEGA crypto engines to side channel atta...
—Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative act...
Sebastian Zander, Grenville J. Armitage, Philip Br...
There have long been threads of investigation into covert channels, and threads of investigation into anonymity, but these two closely related areas of information hiding have not...
Ira S. Moskowitz, Richard E. Newman, Daniel P. Cre...