Side-channel inference attacks on mobile keypads using smartwatches
Smartwatches enable many novel applications and are fast gaining popularity. However, the
presence of a diverse set of onboard sensors provides an additional attack surface to …
presence of a diverse set of onboard sensors provides an additional attack surface to …
SnapCatch: automatic detection of covert timing channels using image processing and machine learning
With the rapid growth of data exfiltration carried out by cyber attacks, Covert Timing
Channels (CTC) have become an imminent network security risk that continues to grow in …
Channels (CTC) have become an imminent network security risk that continues to grow in …
Exploiting Internet of Things protocols for malicious data exfiltration activities
Internet of Things is a widely adopted and pervasive technology, but also one of the most
relevant in cyber-security, given the volume and sensitivity of shared data and the …
relevant in cyber-security, given the volume and sensitivity of shared data and the …
Covert timing channel analysis either as cyber attacks or confidential applications
Covert timing channels are an important alternative for transmitting information in the world
of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival …
of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival …
New covert channels in Internet of Things
Network steganography is a relatively new discipline which studies different steganographic
techniques that utilize network protocols for data hiding. Internet of Things (IoT) is a concept …
techniques that utilize network protocols for data hiding. Internet of Things (IoT) is a concept …
Network protocol covert channels: Countermeasures techniques
MA Elsadig, YA Fadlalla - 2017 9th IEEE-GCC Conference and …, 2017 - ieeexplore.ieee.org
advanced developments in intrusion detection systems (IDS) and computer network
technology encourage hackers to find new ways to leak confidential information without …
technology encourage hackers to find new ways to leak confidential information without …
Covert channel establishment through the dynamic adaptation of the sequential probability ratio test to sensor data in IoT
JW Ho - IEEE Access, 2019 - ieeexplore.ieee.org
Owing to their hidden natures, covert channels can be utilized such that trojan applications
can communicate stealthily with each other or exchange stolen private information without …
can communicate stealthily with each other or exchange stolen private information without …
Power consumption analysis of the new covert channels in coap
This paper presents several novel covert channels in the Constrained Application Protocol
(CoAP)-a specialized Web transfer protocol used for Internet of Things. The suggested new …
(CoAP)-a specialized Web transfer protocol used for Internet of Things. The suggested new …
An RTP extension for reliable user-data transmission over VoIP traffic
J Gao, Y Li, H Jiang, L Liu, X Zhang - … and Privacy in Social Networks and …, 2019 - Springer
Covert channels are those breaking the restrictions of the legitimate channel and
transmitting covert messages secretly. According to the modulation methods, the covert …
transmitting covert messages secretly. According to the modulation methods, the covert …
A light-weight authentication scheme for air force Internet of Things
Internet of Things (IoT) is ubiquitous because of its broad applications and the advance in
communication technologies. The capabilities of IoT also enable its important role in …
communication technologies. The capabilities of IoT also enable its important role in …