Side-channel inference attacks on mobile keypads using smartwatches

A Maiti, M Jadliwala, J He… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Smartwatches enable many novel applications and are fast gaining popularity. However, the
presence of a diverse set of onboard sensors provides an additional attack surface to …

SnapCatch: automatic detection of covert timing channels using image processing and machine learning

S Al-Eidi, O Darwish, Y Chen, G Husari - IEEE Access, 2020 - ieeexplore.ieee.org
With the rapid growth of data exfiltration carried out by cyber attacks, Covert Timing
Channels (CTC) have become an imminent network security risk that continues to grow in …

Exploiting Internet of Things protocols for malicious data exfiltration activities

I Vaccari, S Narteni, M Aiello, M Mongelli… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things is a widely adopted and pervasive technology, but also one of the most
relevant in cyber-security, given the volume and sensitivity of shared data and the …

Covert timing channel analysis either as cyber attacks or confidential applications

S Al-Eidi, O Darwish, Y Chen - Sensors, 2020 - mdpi.com
Covert timing channels are an important alternative for transmitting information in the world
of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival …

New covert channels in Internet of Things

A Mileva, A Velinov, D Stojanov - 2018 - eprints.ugd.edu.mk
Network steganography is a relatively new discipline which studies different steganographic
techniques that utilize network protocols for data hiding. Internet of Things (IoT) is a concept …

Network protocol covert channels: Countermeasures techniques

MA Elsadig, YA Fadlalla - 2017 9th IEEE-GCC Conference and …, 2017 - ieeexplore.ieee.org
advanced developments in intrusion detection systems (IDS) and computer network
technology encourage hackers to find new ways to leak confidential information without …

Covert channel establishment through the dynamic adaptation of the sequential probability ratio test to sensor data in IoT

JW Ho - IEEE Access, 2019 - ieeexplore.ieee.org
Owing to their hidden natures, covert channels can be utilized such that trojan applications
can communicate stealthily with each other or exchange stolen private information without …

Power consumption analysis of the new covert channels in coap

A Velinov, A Mileva, D Stojanov - International Journal On …, 2019 - eprints.ugd.edu.mk
This paper presents several novel covert channels in the Constrained Application Protocol
(CoAP)-a specialized Web transfer protocol used for Internet of Things. The suggested new …

An RTP extension for reliable user-data transmission over VoIP traffic

J Gao, Y Li, H Jiang, L Liu, X Zhang - … and Privacy in Social Networks and …, 2019 - Springer
Covert channels are those breaking the restrictions of the legitimate channel and
transmitting covert messages secretly. According to the modulation methods, the covert …

A light-weight authentication scheme for air force Internet of Things

XH Cao, X Du, EP Ratazzi - ICC 2019-2019 IEEE International …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is ubiquitous because of its broad applications and the advance in
communication technologies. The capabilities of IoT also enable its important role in …