Covert channel

Results: 66



#Item
11Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud Zhenyu Wu Zhang Xu Haining Wang The College of William and Mary

Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud Zhenyu Wu Zhang Xu Haining Wang The College of William and Mary

Add to Reading List

Source URL: www.cs.wm.edu

Language: English - Date: 2012-08-20 22:24:04
    12Security Implications of Memory Deduplication in a Virtualized Environment Jidong Xiao∗ , Zhang Xu∗ , Hai Huang† , Haining Wang∗ ∗ The † IBM

    Security Implications of Memory Deduplication in a Virtualized Environment Jidong Xiao∗ , Zhang Xu∗ , Hai Huang† , Haining Wang∗ ∗ The † IBM

    Add to Reading List

    Source URL: www.cs.wm.edu

    Language: English - Date: 2013-05-30 14:58:15
    13On Robust Covert Channels Inside DNS Lucas Nussbaum, Pierre Neyron and Olivier Richard Laboratoire d’Informatique de Grenoble / INRIA Lucas Nussbaum, Pierre Neyron and Olivier Richard On Robust Covert Channels Inside D

    On Robust Covert Channels Inside DNS Lucas Nussbaum, Pierre Neyron and Olivier Richard Laboratoire d’Informatique de Grenoble / INRIA Lucas Nussbaum, Pierre Neyron and Olivier Richard On Robust Covert Channels Inside D

    Add to Reading List

    Source URL: www.loria.fr

    Language: English - Date: 2011-10-12 09:35:39
    14Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George

    Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George

    Add to Reading List

    Source URL: www.ists.dartmouth.edu

    Language: English - Date: 2008-09-11 13:38:43
      15Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud Zhenyu Wu Zhang Xu Haining Wang The College of William and Mary

      Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud Zhenyu Wu Zhang Xu Haining Wang The College of William and Mary

      Add to Reading List

      Source URL: www.usenix.org

      Language: English
        16A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

        A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

        Add to Reading List

        Source URL: cisr.nps.edu

        Language: English - Date: 2008-08-18 13:41:06
        17Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention John Geddes Max Schuchard

        Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention John Geddes Max Schuchard

        Add to Reading List

        Source URL: www-users.cs.umn.edu

        Language: English - Date: 2013-09-04 16:00:20
        18Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Deian Stefan1 Alejandro Russo2

        Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Deian Stefan1 Alejandro Russo2

        Add to Reading List

        Source URL: amitlevy.com

        Language: English - Date: 2012-10-19 15:09:55
        19The b2/c3 problem: How big buffers overcome covert channel cynicism in trusted database systems J. McDermott Naval Research Laboratory, Code 5542, Washington, DC 23075, USA Abstract We present a mechanism for communicati

        The b2/c3 problem: How big buffers overcome covert channel cynicism in trusted database systems J. McDermott Naval Research Laboratory, Code 5542, Washington, DC 23075, USA Abstract We present a mechanism for communicati

        Add to Reading List

        Source URL: www.gray-world.net

        Language: English - Date: 2010-06-12 03:14:41
          20Covert Channel Analysis and Data Hiding in TCP/IP  by Kamran Ahsan

          Covert Channel Analysis and Data Hiding in TCP/IP by Kamran Ahsan

          Add to Reading List

          Source URL: www.gray-world.net

          Language: English - Date: 2010-06-12 03:14:41