泛在网络环境下隐蔽通道关键技术研究综述

李凤华, 李超洋, 郭超, 李子孚, 房梁, 郭云川 - 通信学报, 2022 - infocomm-journal.com
在泛在网络环境下, 隐蔽通道通过修改系统共享资源, 绕开系统的安全策略传输隐蔽信息,
给计算机和网络系统造成了严重的安全威胁. 针对此问题, 主要从度量, 构建和检测3 …

A lightweight and practical anonymous authentication protocol based on bit-self-test PUF

Y An, Y Zhang, W Cao, Z Tong, Z He - Electronics, 2022 - mdpi.com
Physical unclonable function (PUF), a cryptographic primitive, has recently been used in
protocol design because it can ensure a tamper-evident feature. In many PUF-based …

SnapCatch: automatic detection of covert timing channels using image processing and machine learning

S Al-Eidi, O Darwish, Y Chen, G Husari - IEEE Access, 2020 - ieeexplore.ieee.org
With the rapid growth of data exfiltration carried out by cyber attacks, Covert Timing
Channels (CTC) have become an imminent network security risk that continues to grow in …

Using hierarchical statistical analysis and deep neural networks to detect covert timing channels

O Darwish, A Al-Fuqaha, GB Brahim, I Jenhani… - Applied Soft …, 2019 - Elsevier
Covert timing channels provide a mechanism to leak data across different entities.
Manipulating the timing between packet arrivals is a well-known example of such approach …

Covert timing channel analysis either as cyber attacks or confidential applications

S Al-Eidi, O Darwish, Y Chen - Sensors, 2020 - mdpi.com
Covert timing channels are an important alternative for transmitting information in the world
of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival …

Android malware detection based on program genes

Q Li, G Chen, B Li - Security and Communication Networks, 2023 - Wiley Online Library
The security issues with mobile devices have received more attention as a result of the
development of mobile Internet technology and the adoption of mobile intelligent terminal …

Towards a streaming approach to the mitigation of covert timing channels

O Darwish, A Al-Fuqaha, GB Brahim… - … & Mobile Computing …, 2018 - ieeexplore.ieee.org
Leaking data using covert timing channels is considered as a critical threat in network
communication. These type of channels use the time between inter-arrival packets to pass …

Covert channel detection using machine learning methods

İG Çavuşoğlu - 2019 - open.metu.edu.tr
A covert channel is a communication method that misuses legitimate resources to bypass
intrusion detection systems. They can be used to do illegal work like leaking classified (or …

Snapcatch–Protection of Data from Covert Timing Channels

R Nithiavathy, R Pooja, B Ramya - Journal of Algebraic Statistics, 2022 - publishoa.com
In day-to-day life there is a rapid increase in data exfiltration enabled by digital attacks,
Covert Timing Channels (CTC) became an inevitable organisation potential threat that …

[图书][B] Exploring the use of hierarchal statistical analysis and deep neural networks to detect and mitigate covert timing channels

O Darwish - 2018 - search.proquest.com
Covert timing channels provide a mechanism to transmit unauthorized information across
different processes. It utilizes the inter-arrival times between the transmitted packets to hide …