Practical covert wireless unidirectional communication in IEEE 802.11 environment
H Seong, I Kim, Y Jeon, MK Oh, S Lee… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Covert communications, or covert channels, are commonly exploited to establish a data
exfiltration channel from an insider on a trusted network to a malicious receiver outside the …
exfiltration channel from an insider on a trusted network to a malicious receiver outside the …
Towards a reliable detection of covert timing channels over real-time network traffic
Inter-packet delays (IPD) of legitimate network traffic can be exploited for information hiding
purposes and distribution of secret and sensitive data. This process is known as Covert …
purposes and distribution of secret and sensitive data. This process is known as Covert …
A Robust Covert Channel With Self-Bit Recovery for IEEE 802.11 Networks
Covert channels are commonly perceived as potential attack vectors in wireless
communication environments and are categorized into covert timing channels and covert …
communication environments and are categorized into covert timing channels and covert …
An RTP extension for reliable user-data transmission over VoIP traffic
J Gao, Y Li, H Jiang, L Liu, X Zhang - … and Privacy in Social Networks and …, 2019 - Springer
Covert channels are those breaking the restrictions of the legitimate channel and
transmitting covert messages secretly. According to the modulation methods, the covert …
transmitting covert messages secretly. According to the modulation methods, the covert …
Hybrid covert channel in LTE-A: modeling and analysis
As a major approach to information leakage, covert channels are rapidly gaining popularity
with the exponentially growing of cloud computing and network resources. Long Term …
with the exponentially growing of cloud computing and network resources. Long Term …
The role of hierarchical entropy analysis in the detection and time-scale determination of covert timing channels
This paper evaluates the potential use of hierarchal entropy analysis to detect covert timing
channels and determine the best time-scale that reveals it. A data transmission simulator is …
channels and determine the best time-scale that reveals it. A data transmission simulator is …
Detecting covert timing channels using non-parametric statistical approaches
Extensive availability and development of Internet applications and services open up the
opportunity for abusing network and Internet resources to distribute malicious data and leak …
opportunity for abusing network and Internet resources to distribute malicious data and leak …
Covertinspector: Identification of shared memory covert timing channel in multi-tenanted cloud
S Wang, W Qiang, H Jin, J Yuan - International Journal of Parallel …, 2017 - Springer
Memory deduplication improves the memory efficiency of common multi-tenanted cloud.
Due to the cross-VM memory sharing, malicious users can mount covert channel attack to …
Due to the cross-VM memory sharing, malicious users can mount covert channel attack to …
Evaluation and verification of automated covert channel modeling using a real network platform
In this paper we introduce and verify our Automated Covert Channel Modeling (ACCM)
framework for evaluating and modeling covert channel algorithms. This work continues our …
framework for evaluating and modeling covert channel algorithms. This work continues our …
Supervised learning framework for covert channel detection in LTE‐A
Covert channels transmit secret information by using the existing resources which were not
designed for communication. As a major approach to information leakage, covert channels …
designed for communication. As a major approach to information leakage, covert channels …