메뉴 건너뛰기




Volumn 3200, Issue , 2004, Pages 164-179

Syntax and Semantics-Preserving Application-Layer Protocol Steganography

Author keywords

Application protocols; Semantics; SSH; Steganography; Syntax

Indexed keywords

INTERNET PROTOCOLS; STEGANOGRAPHY; SYNTACTICS; SEMANTICS;

EID: 33746066591     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30114-1_12     Document Type: Article
Times cited : (32)

References (36)
  • 3
    • 0012085074 scopus 로고    scopus 로고
    • Information Hiding: Proceedings of the First International Workshop
    • Anderson, R., ed.: Anderson, R., ed.: Cambridge, U.K., Springer
    • Anderson, R., ed.: Information Hiding: Proceedings of the First International Workshop. In Anderson, R., ed.: Lecture Notes in Computer Science 1174, Cambridge, U.K., Springer (1996)
    • (1996) Lecture Notes in Computer Science 1174
  • 4
    • 0012085074 scopus 로고    scopus 로고
    • Information Hiding: Proceedings of the Second International Workshop
    • Aucsmith, D., ed.: Aucsmith, D., ed.: Portland, Oregon, U.S.A., Springer
    • Aucsmith, D., ed.: Information Hiding: Proceedings of the Second International Workshop. In Aucsmith, D., ed.: Lecture Notes in Computer Science 1525, Portland, Oregon, U.S.A., Springer (1998)
    • (1998) Lecture Notes in Computer Science , vol.1525
  • 5
    • 0012085074 scopus 로고    scopus 로고
    • Information Hiding: Proceedings of the Fourth International Workshop
    • Moskowitz, I.S., ed.: Moskowitz, I.S., ed.: Pittsburg, PA, U.S.A., Springer
    • Moskowitz, I.S., ed.: Information Hiding: Proceedings of the Fourth International Workshop. In Moskowitz, I.S., ed.: Lecture Notes in Computer Science 2137, Pittsburg, PA, U.S.A., Springer (2001)
    • (2001) Lecture Notes in Computer Science , vol.2137
  • 7
    • 0012085074 scopus 로고    scopus 로고
    • Information Hiding: Proceedings of the Third International Workshop
    • Pfitzmann, A., ed.: Pfitzmann, A., ed.: Dresden, Germany, Springer
    • Pfitzmann, A., ed.: Information Hiding: Proceedings of the Third International Workshop. In Pfitzmann, A., ed.: Lecture Notes in Computer Science 1768, Dresden, Germany, Springer (1999)
    • (1999) Lecture Notes in Computer Science , vol.1768
  • 8
    • 35048830418 scopus 로고    scopus 로고
    • Information hiding through semantics-preserving application-layer protocol steganography
    • Center for Systems Assurance, Syracuse University
    • Chapin, S.J., Ostermann, S.: Information hiding through semantics-preserving application-layer protocol steganography. Technical report, Center for Systems Assurance, Syracuse University (2002)
    • (2002) Technical Report
    • Chapin, S.J.1    Ostermann, S.2
  • 10
    • 33746096279 scopus 로고    scopus 로고
    • Oak Ridge National Laboratory (Contract No. DE-AC05-96OR22464), Oak Ridge, Tennessee (1998) [ORNL/TM-limited distribution].
    • Dunigan, T.: Internet steganography. Technical report, Oak Ridge National Laboratory (Contract No. DE-AC05-96OR22464), Oak Ridge, Tennessee (1998) [ORNL/TM-limited distribution].
    • Internet Steganography. Technical Report
    • Dunigan, T.1
  • 12
    • 35048902629 scopus 로고    scopus 로고
    • route@infonexus.com, alhambra@infornexus.com: Article 6. Phrack Magazine, 49 (1996) Retrieved on August 27, 2002 from the World Wide Web
    • route@infonexus.com, alhambra@infornexus.com: Article 6. Phrack Magazine, 49 (1996) Retrieved on August 27, 2002 from the World Wide Web: http://www.phrack.com/phrack/49/P49-06.
  • 14
    • 35048888506 scopus 로고    scopus 로고
    • CAIDA.org: Characterization of internet traffic loads, segregated by application - OC48 analysis (2002) Retrieved on October 15, 2003 from the World Wide Web
    • CAIDA.org: Characterization of internet traffic loads, segregated by application - OC48 analysis (2002) Retrieved on October 15, 2003 from the World Wide Web: http://www.caida.org/analysis/workload/byapplication/oc48/20020305/ apps_perc_20020305/index.xml.
  • 17
    • 35048825755 scopus 로고    scopus 로고
    • An information-theoreic model for steganography
    • Cachin, C.: An information-theoreic model for steganography. Technical Report Report 2000/028 (2002) http://www.zurich.ibm.com/cca/papers/stego.pdf.
    • (2002) Technical Report Report 2000/028
    • Cachin, C.1
  • 26
    • 0001217738 scopus 로고
    • The prisoners' problem and the subliminal channel
    • Plenum Press
    • Simmons, G.J.: The prisoners' problem and the subliminal channel. In: Proceedings of CRYPTO '83, Plenum Press (1984) 51-67
    • (1984) Proceedings of CRYPTO '83 , pp. 51-67
    • Simmons, G.J.1
  • 28
    • 0001187269 scopus 로고    scopus 로고
    • Anderson, R., ed.: Cambridge, U.K., Springer
    • Pfitzmann, B.: Information hiding terminology. In Anderson, R., ed.: Information Hiding: Proceedings of the First International Workshop, Cambridge, U.K., Springer (1996) 347-349
    • (1996) Information hiding terminology , pp. 347-349
    • Pfitzmann, B.1
  • 30
    • 35048890085 scopus 로고    scopus 로고
    • Ka0ticSH: Diggin em walls (part 3) - advanced/other techniques for bypassing firewalls. New Order (2002) Retrieved on August 28, 2002 from the World Wide Web
    • Ka0ticSH: Diggin em walls (part 3) - advanced/other techniques for bypassing firewalls. New Order (2002) Retrieved on August 28, 2002 from the World Wide Web: http://neworder.box.sk/newsread.php?newsid=3957.
  • 33
    • 1642343952 scopus 로고    scopus 로고
    • New covert channels in HTTP - Adding unwitting web browsers to anonymity sets
    • Samarati, P., Syverson, P., eds.: Washington, DC, USA, ACM Press ISBN 1-58113-776-1.
    • Bauer, M.: New covert channels in HTTP - adding unwitting web browsers to anonymity sets. In Samarati, P., Syverson, P., eds.: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, Washington, DC, USA, ACM Press (2003) 72-78 ISBN 1-58113-776-1.
    • (2003) Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society , pp. 72-78
    • Bauer, M.1
  • 34
    • 35048831362 scopus 로고    scopus 로고
    • Secure Shell Working Group, I.E.T.F.I.: The secure shell. Retrieved on October 26, 2003 from the World Wide Web
    • Secure Shell Working Group, I.E.T.F.I.: The secure shell. Retrieved on October 26, 2003 from the World Wide Web: http://www.ietf.org/html.charters/ secshcharter.html (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.