-
1
-
-
38049087058
-
Detection of Covert Channel Encoding in Network Pcket Delays
-
Technical Report
-
Berk, V., Giani, A., and Cyberko, G. Detection of Covert Channel Encoding in Network Pcket Delays. Technical Report, 2005.
-
(2005)
-
-
Berk, V.1
Giani, A.2
Cyberko, G.3
-
5
-
-
32444445843
-
Covert Messaging Through TCP Timestamps
-
Giffin, J., Greenstadt, R., Litwack, P. and Tibbetts, R. Covert Messaging Through TCP Timestamps. In Workshop on Privacy Ehancing Technologies, 2002.
-
(2002)
Workshop on Privacy Ehancing Technologies
-
-
Giffin, J.1
Greenstadt, R.2
Litwack, P.3
Tibbetts, R.4
-
6
-
-
0036715113
-
An Information-Theoretic and Game-Theoretic Study of Timming Channels
-
Giles, J., nd Hajek, B. An Information-Theoretic and Game-Theoretic Study of Timming Channels. In IEEE Transactions on Information Theory, vol. 48, 2002.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
-
-
Giles, J.1
nd Hajek, B.2
-
7
-
-
85084160972
-
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
-
Handley, M. and Paxson, V. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. In USENIX Security Symposium, 2001.
-
(2001)
USENIX Security Symposium
-
-
Handley, M.1
Paxson, V.2
-
12
-
-
70349658041
-
-
Kocher, P. C. Timing Attacks on Implementation of Diffie- Hellman, RSA, DSS, and Other Systems. In CRYPTO,1996.
-
Kocher, P. C. Timing Attacks on Implementation of Diffie- Hellman, RSA, DSS, and Other Systems. In CRYPTO,1996.
-
-
-
-
13
-
-
0015672289
-
A Note on the Confinement Problem
-
Lampson, B. W. A Note on the Confinement Problem. In Communications of the ACM, vol. 16, 1973.
-
(1973)
Communications of the ACM
, vol.16
-
-
Lampson, B.W.1
-
16
-
-
0027986089
-
-
Moskowitz, I. S. and Miller, A. R. Simple Timing Channels. In IEEE Symposium on Security and Privacy, 1994.
-
Moskowitz, I. S. and Miller, A. R. Simple Timing Channels. In IEEE Symposium on Security and Privacy, 1994.
-
-
-
-
18
-
-
70349663444
-
Covert Channels and Anonymizing Networks
-
Moskowitz, I. S., Newman, R., Crepeau, D. and Miller, A. Covert Channels and Anonymizing Networks. In Workshop on Privacy in the Electronic Society, 2008.
-
(2008)
Workshop on Privacy in the Electronic Society
-
-
Moskowitz, I.S.1
Newman, R.2
Crepeau, D.3
Miller, A.4
-
19
-
-
2642558406
-
Covert Channels in the TCP/IP Protocol Suite
-
Rowland, H. C. Covert Channels in the TCP/IP Protocol Suite. First Monday, http://www.firstmonday.dk/ issues/issue2-5/rowland/, 1996.
-
(1996)
First Monday
-
-
Rowland, H.C.1
-
22
-
-
70349678023
-
-
UC Davis Denial of Servic (DoS) project, meeting notes. http://seclab.cs.ucdavis.edu/projects/ denial-service/meetings/01-27-99m.html, 1999.
-
UC Davis Denial of Servic (DoS) project, meeting notes. http://seclab.cs.ucdavis.edu/projects/ denial-service/meetings/01-27-99m.html, 1999.
-
-
-
-
23
-
-
70349693423
-
Trusted Computer System Evaluation "The Orange Book
-
U.S. Department of Defense
-
U.S. Department of Defense. Trusted Computer System Evaluation "The Orange Book". In DoD 5200.28-STD Washington: GPO:1985, 1985.
-
(1985)
DoD 5200.28-STD Washington: GPO:1985
-
-
|