Supplemental Material
Available for Download
- J. Jaskolka and R. Khedri. Exploring covert channels. In Proc. of HICSS-44, pages 1-10, Koloa, Kauai, HI, USA, Jan. 2011. Google ScholarDigital Library
- J. Jaskolka, R. Khedri, and K. Sabri. Information leakage via protocol-based covert channels: Detection, automation, and applications. Technical Report CAS-11-05-RK, McMaster University, Hamilton, ON, Canada, August 2011.Google Scholar
- G. Schmidt and T. Ströhlein. Relations and Graphs: Discrete Mathematics for Computer Science. EATCS Monographs on Theoretical Computer Science. Springer-Verlag, 1993. Google ScholarDigital Library
- C. Scott. Network covert channels: Review of current state and analysis of viability of the use of x.509 certificates for covert communications. Technical Report RHUL-MA-2008-11, Royal Holloway, University of London, Jan. 2007.Google Scholar
- S. Srinivasan. Security and privacy in the computer forensics context. In Proc. of IEEE ICCT2006, pages 1-3, Guilin, China, Nov. 2006.Google ScholarCross Ref
- USA Department of Defense. Trusted Computer System Evaluation Criteria. Number DoD 5200.28-STD in Defense Department Rainbow Series. DoD/NCSC, Fort George G. Meade, MD, USA, Dec. 1985.Google Scholar
- USA Department of Homeland Security. A roadmap for cybersecurity research. DHS Science and Technology Directorate, Washington, DC, USA, Nov. 2009.Google Scholar
- Zodiologists. The zodiac killer's 408 character cipher. http://www.zodiologists.com/z408_cipher.html (Accessed: Apr. 8, 2011), 2009.Google Scholar
Recommendations
Detecting covert timing channels: an entropy-based approach
CCS '07: Proceedings of the 14th ACM conference on Computer and communications securityThe detection of covert timing channels is of increasing interest in light of recent practice on the exploitation of covert timing channels over the Internet. However, due to the high variation in legitimate network traffic, detecting covert timing ...
An Entropy-Based Approach to Detecting Covert Timing Channels
The detection of covert timing channels is of increasing interest in light of recent exploits of covert timing channels over the Internet. However, due to the high variation in legitimate network traffic, detecting covert timing channels is a ...
Detecting protocol switching covert channels
LCN '12: Proceedings of the 2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)Network covert channels enable hidden communication and can be used to break security policies. Within the last years, new techniques for such covert channels arose, including protocol switching covert channels (PSCCs). PSCCs transfer hidden information ...
Comments