Covert channel

Results: 66



#Item
31Eliminating Covert Channels in IPv6 with Network-Aware Active Wardens Norka B. Lucena, Grzegorz Lewandowski, and Steve J. Chapin Systems Assurance Institute Department of Electrical Engineering and Computer Science Syrac

Eliminating Covert Channels in IPv6 with Network-Aware Active Wardens Norka B. Lucena, Grzegorz Lewandowski, and Steve J. Chapin Systems Assurance Institute Department of Electrical Engineering and Computer Science Syrac

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2008-07-23 07:29:14
32Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Deian Stefan1 Alejandro Russo2

Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Deian Stefan1 Alejandro Russo2

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2012-09-18 17:22:52
33Covert channels and anonymity Steven J. Murdoch Computer Laboratory Security Group

Covert channels and anonymity Steven J. Murdoch Computer Laboratory Security Group

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-24 13:58:54
34Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel Michael Peter Matthias Petschick

Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel Michael Peter Matthias Petschick

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-10 16:02:06
35Covert Channels inside DNS Lucas Nussbaum Lucas Nussbaum Covert Channels inside DNS

Covert Channels inside DNS Lucas Nussbaum Lucas Nussbaum Covert Channels inside DNS

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2011-10-12 09:35:39
36Analysis of the Wireless Covert Channel Attack: Carrier Frequency Selection Geir Olav Dyrkolbotn Norwegian Information Security Lab, Gjøvik University College [removed]

Analysis of the Wireless Covert Channel Attack: Carrier Frequency Selection Geir Olav Dyrkolbotn Norwegian Information Security Lab, Gjøvik University College [removed]

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2007-10-11 06:27:34
37IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 1, JANUARY[removed]Language-Based Information-Flow Security Andrei Sabelfeld and Andrew C. Myers

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 1, JANUARY[removed]Language-Based Information-Flow Security Andrei Sabelfeld and Andrew C. Myers

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-01-07 13:58:19
38An Exploration of L2 Cache Covert Channels in Virtualized Environments Kaustubh Joshi, Matti Hiltunen, Richard Schlichting  Yunjing Xu, Michael Bailey,

An Exploration of L2 Cache Covert Channels in Virtualized Environments Kaustubh Joshi, Matti Hiltunen, Richard Schlichting Yunjing Xu, Michael Bailey,

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2014-08-05 13:28:17
39Reliable Transmission Over Covert Channels in First Person Shooter Multiplayer Games Sebastian Zander, Grenville Armitage, Philip Branch {szander, garmitage, pbranch}@swin.edu.au

Reliable Transmission Over Covert Channels in First Person Shooter Multiplayer Games Sebastian Zander, Grenville Armitage, Philip Branch {szander, garmitage, pbranch}@swin.edu.au

Add to Reading List

Source URL: caia.swin.edu.au

Language: English - Date: 2010-09-09 01:11:41
40Covert Channels in Multiplayer First Person Shooter Online Games Sebastian Zander, Grenville Armitage, Philip Branch {szander, garmitage, pbranch}@swin.edu.au Centre for Advanced Internet Architectures (CAIA)

Covert Channels in Multiplayer First Person Shooter Online Games Sebastian Zander, Grenville Armitage, Philip Branch {szander, garmitage, pbranch}@swin.edu.au Centre for Advanced Internet Architectures (CAIA)

Add to Reading List

Source URL: caia.swin.edu.au

Language: English - Date: 2010-09-09 01:11:41