泛在网络环境下隐蔽通道关键技术研究综述
李凤华, 李超洋, 郭超, 李子孚, 房梁, 郭云川 - 通信学报, 2022 - infocomm-journal.com
在泛在网络环境下, 隐蔽通道通过修改系统共享资源, 绕开系统的安全策略传输隐蔽信息,
给计算机和网络系统造成了严重的安全威胁. 针对此问题, 主要从度量, 构建和检测3 …
给计算机和网络系统造成了严重的安全威胁. 针对此问题, 主要从度量, 构建和检测3 …
A lightweight and practical anonymous authentication protocol based on bit-self-test PUF
Y An, Y Zhang, W Cao, Z Tong, Z He - Electronics, 2022 - mdpi.com
Physical unclonable function (PUF), a cryptographic primitive, has recently been used in
protocol design because it can ensure a tamper-evident feature. In many PUF-based …
protocol design because it can ensure a tamper-evident feature. In many PUF-based …
SnapCatch: automatic detection of covert timing channels using image processing and machine learning
With the rapid growth of data exfiltration carried out by cyber attacks, Covert Timing
Channels (CTC) have become an imminent network security risk that continues to grow in …
Channels (CTC) have become an imminent network security risk that continues to grow in …
Using hierarchical statistical analysis and deep neural networks to detect covert timing channels
Covert timing channels provide a mechanism to leak data across different entities.
Manipulating the timing between packet arrivals is a well-known example of such approach …
Manipulating the timing between packet arrivals is a well-known example of such approach …
Covert timing channel analysis either as cyber attacks or confidential applications
Covert timing channels are an important alternative for transmitting information in the world
of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival …
of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival …
Android malware detection based on program genes
Q Li, G Chen, B Li - Security and Communication Networks, 2023 - Wiley Online Library
The security issues with mobile devices have received more attention as a result of the
development of mobile Internet technology and the adoption of mobile intelligent terminal …
development of mobile Internet technology and the adoption of mobile intelligent terminal …
Towards a streaming approach to the mitigation of covert timing channels
Leaking data using covert timing channels is considered as a critical threat in network
communication. These type of channels use the time between inter-arrival packets to pass …
communication. These type of channels use the time between inter-arrival packets to pass …
Covert channel detection using machine learning methods
İG Çavuşoğlu - 2019 - open.metu.edu.tr
A covert channel is a communication method that misuses legitimate resources to bypass
intrusion detection systems. They can be used to do illegal work like leaking classified (or …
intrusion detection systems. They can be used to do illegal work like leaking classified (or …
Snapcatch–Protection of Data from Covert Timing Channels
R Nithiavathy, R Pooja, B Ramya - Journal of Algebraic Statistics, 2022 - publishoa.com
In day-to-day life there is a rapid increase in data exfiltration enabled by digital attacks,
Covert Timing Channels (CTC) became an inevitable organisation potential threat that …
Covert Timing Channels (CTC) became an inevitable organisation potential threat that …
[图书][B] Exploring the use of hierarchal statistical analysis and deep neural networks to detect and mitigate covert timing channels
O Darwish - 2018 - search.proquest.com
Covert timing channels provide a mechanism to transmit unauthorized information across
different processes. It utilizes the inter-arrival times between the transmitted packets to hide …
different processes. It utilizes the inter-arrival times between the transmitted packets to hide …