Covert channel

Results: 66



#Item
21Title: Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Speaker: Alejandro Russo Abstract: When termination of a program is observable by an adversary, confidential information may

Title: Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Speaker: Alejandro Russo Abstract: When termination of a program is observable by an adversary, confidential information may

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:09
22DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Unix permission bits are an example - Might set a file private so only group friends can read it

DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Unix permission bits are an example - Might set a file private so only group friends can read it

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
232015 IEEE CS Security and Privacy Workshops  Passing go with DNA sequencing: Delivering messages in a covert transgenic channel Ji Young Chun

2015 IEEE CS Security and Privacy Workshops Passing go with DNA sequencing: Delivering messages in a covert transgenic channel Ji Young Chun

Add to Reading List

Source URL: www.genopri.org

Language: English - Date: 2015-05-21 15:26:41
    24Poster: Games Without Frontiers: Investigating Video Games as a Covert Channel Bridger Hahn Rishab Nithyanand

    Poster: Games Without Frontiers: Investigating Video Games as a Covert Channel Bridger Hahn Rishab Nithyanand

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:42:19
      252014 IEEE Security and Privacy Workshops  Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment Bartosz Lipiński, Wojciech Mazurczyk, Krzysztof Szczypiorski Warsaw University of Technology,

      2014 IEEE Security and Privacy Workshops Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment Bartosz Lipiński, Wojciech Mazurczyk, Krzysztof Szczypiorski Warsaw University of Technology,

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2014-04-30 03:11:29
        26A New Covert Channel over Cellular Voice Channel in Smartphones Bushra Aloraini, Daryl Johnson, Bill Stackpole, and Sumita Mishra Golisano College of Computing and Information Sciences Rochester Institute of Technology R

        A New Covert Channel over Cellular Voice Channel in Smartphones Bushra Aloraini, Daryl Johnson, Bill Stackpole, and Sumita Mishra Golisano College of Computing and Information Sciences Rochester Institute of Technology R

        Add to Reading List

        Source URL: arxiv.org

        Language: English - Date: 2015-04-22 20:06:09
          272014 IEEE Security and Privacy Workshops  Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment Bartosz Lipiński, Wojciech Mazurczyk, Krzysztof Szczypiorski Warsaw University of Technology,

          2014 IEEE Security and Privacy Workshops Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment Bartosz Lipiński, Wojciech Mazurczyk, Krzysztof Szczypiorski Warsaw University of Technology,

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2014-04-30 03:11:29
            28Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Deian Stefan1 Alejandro Russo2

            Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Deian Stefan1 Alejandro Russo2

            Add to Reading List

            Source URL: www.amitlevy.com

            Language: English - Date: 2012-10-19 15:09:55
            29CCHEF – Covert Channels Evaluation Framework User Manual Version 0.1 Sebastian Zander {} May 21, 2008 Abstract Communication is not necessarily made secure by the use of encryption alone. The mere ex

            CCHEF – Covert Channels Evaluation Framework User Manual Version 0.1 Sebastian Zander {} May 21, 2008 Abstract Communication is not necessarily made secure by the use of encryption alone. The mere ex

            Add to Reading List

            Source URL: caia.swin.edu.au

            Language: English - Date: 2008-05-20 22:39:30
            30CCHEF – Covert Channels Evaluation Framework Design and Implementation Sebastian Zander, Grenville Armitage Centre for Advanced Internet Architectures, Technical Report 080530A Swinburne University of Technology Melbou

            CCHEF – Covert Channels Evaluation Framework Design and Implementation Sebastian Zander, Grenville Armitage Centre for Advanced Internet Architectures, Technical Report 080530A Swinburne University of Technology Melbou

            Add to Reading List

            Source URL: caia.swin.edu.au

            Language: English - Date: 2008-05-30 05:00:54