Practical covert wireless unidirectional communication in IEEE 802.11 environment

H Seong, I Kim, Y Jeon, MK Oh, S Lee… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Covert communications, or covert channels, are commonly exploited to establish a data
exfiltration channel from an insider on a trusted network to a malicious receiver outside the …

Towards a reliable detection of covert timing channels over real-time network traffic

F Rezaei, M Hempel, H Sharif - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Inter-packet delays (IPD) of legitimate network traffic can be exploited for information hiding
purposes and distribution of secret and sensitive data. This process is known as Covert …

A Robust Covert Channel With Self-Bit Recovery for IEEE 802.11 Networks

S Son, D Kwon, S Lee, Y Jeon… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Covert channels are commonly perceived as potential attack vectors in wireless
communication environments and are categorized into covert timing channels and covert …

An RTP extension for reliable user-data transmission over VoIP traffic

J Gao, Y Li, H Jiang, L Liu, X Zhang - … and Privacy in Social Networks and …, 2019 - Springer
Covert channels are those breaking the restrictions of the legitimate channel and
transmitting covert messages secretly. According to the modulation methods, the covert …

Hybrid covert channel in LTE-A: modeling and analysis

G Xu, W Yang, L Huang - Journal of Network and Computer Applications, 2018 - Elsevier
As a major approach to information leakage, covert channels are rapidly gaining popularity
with the exponentially growing of cloud computing and network resources. Long Term …

The role of hierarchical entropy analysis in the detection and time-scale determination of covert timing channels

O Darwish, A Al-Fuqaha, M Anan… - … and Mobile Computing …, 2015 - ieeexplore.ieee.org
This paper evaluates the potential use of hierarchal entropy analysis to detect covert timing
channels and determine the best time-scale that reveals it. A data transmission simulator is …

Detecting covert timing channels using non-parametric statistical approaches

F Rezaei, M Hempel, PL Shrestha… - 2015 International …, 2015 - ieeexplore.ieee.org
Extensive availability and development of Internet applications and services open up the
opportunity for abusing network and Internet resources to distribute malicious data and leak …

Covertinspector: Identification of shared memory covert timing channel in multi-tenanted cloud

S Wang, W Qiang, H Jin, J Yuan - International Journal of Parallel …, 2017 - Springer
Memory deduplication improves the memory efficiency of common multi-tenanted cloud.
Due to the cross-VM memory sharing, malicious users can mount covert channel attack to …

Evaluation and verification of automated covert channel modeling using a real network platform

F Rezaei, M Hempel, PL Shrestha… - 2014 IEEE Military …, 2014 - ieeexplore.ieee.org
In this paper we introduce and verify our Automated Covert Channel Modeling (ACCM)
framework for evaluating and modeling covert channel algorithms. This work continues our …

Supervised learning framework for covert channel detection in LTE‐A

G Xu, W Yang, L Huang - IET Information Security, 2018 - Wiley Online Library
Covert channels transmit secret information by using the existing resources which were not
designed for communication. As a major approach to information leakage, covert channels …