A lightweight and practical anonymous authentication protocol based on bit-self-test PUF

Y An, Y Zhang, W Cao, Z Tong, Z He - Electronics, 2022 - mdpi.com
Physical unclonable function (PUF), a cryptographic primitive, has recently been used in
protocol design because it can ensure a tamper-evident feature. In many PUF-based …

SnapCatch: automatic detection of covert timing channels using image processing and machine learning

S Al-Eidi, O Darwish, Y Chen, G Husari - IEEE Access, 2020 - ieeexplore.ieee.org
With the rapid growth of data exfiltration carried out by cyber attacks, Covert Timing
Channels (CTC) have become an imminent network security risk that continues to grow in …

Using hierarchical statistical analysis and deep neural networks to detect covert timing channels

O Darwish, A Al-Fuqaha, GB Brahim, I Jenhani… - Applied Soft …, 2019 - Elsevier
Covert timing channels provide a mechanism to leak data across different entities.
Manipulating the timing between packet arrivals is a well-known example of such approach …

Covert timing channel analysis either as cyber attacks or confidential applications

S Al-Eidi, O Darwish, Y Chen - Sensors, 2020 - mdpi.com
Covert timing channels are an important alternative for transmitting information in the world
of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival …

Detection of covert timing channel based on time series symbolization

S Wu, Y Chen, H Tian, C Sun - IEEE Open Journal of the …, 2021 - ieeexplore.ieee.org
Covert Timing Channels (CTCs) is a technique to leak information. CTCs only modify inter-
arrival time sequence (IATs) between packets, consequently, traditional network security …

Aerial Reconfigurable Intelligent Surface-Assisted Channel Modeling Incorporating the Effect of UAV Fluctuations

Z Wang, J Bian, CX Wang, Y Liu… - IEEE Communications …, 2024 - ieeexplore.ieee.org
Aerial reconfigurable intelligent surface (ARIS) system refers to a novel transmission
scheme, in which an RIS is mounted on aerial platforms, such as unmanned aerial vehicles …

Towards a streaming approach to the mitigation of covert timing channels

O Darwish, A Al-Fuqaha, GB Brahim… - … & Mobile Computing …, 2018 - ieeexplore.ieee.org
Leaking data using covert timing channels is considered as a critical threat in network
communication. These type of channels use the time between inter-arrival packets to pass …

Using MapReduce and hierarchical entropy analysis to speed-up the detection of covert timing channels

O Darwish, A Al-Fuqaha, GB Brahim… - … and Mobile Computing …, 2017 - ieeexplore.ieee.org
Covert timing channels provide a mechanism to transmit unauthorized information across
different processes. Applications that generate large datasets allow this information to be …

ConTra: A Covert Timing Channel Detection Approach for Little Covert Information in a Network

Z Li, Y Chen, Z Teng, X Huang - … of the 2023 4th International Conference …, 2023 - dl.acm.org
A covert timing channel is a technical means that enables information hiding and covert
communication. Due to the fact that covert timing channels can elude detection by security …

IoT-Enhanced Malicious URL Detection Using Machine Learning

A Weshahi, F Dwaik, M Khouli, HI Ashqar… - International Conference …, 2024 - Springer
The exponential growth of the internet has led to a surge in malicious URLs, posing a
significant threat to online security. Traditional methods, like signature-based detection, are …