Back to Results
First PageMeta Content
Computer networking / Covert channel / Steganography / Keystroke logging / Channel / Transmission Control Protocol / Timing attack / Jitter / Overt channel / Computing / Espionage / Electronics


Keyboards and Covert Channels Gaurav Shah, Andres Molina and Matt Blaze Department of Computer and Information Science University of Pennsylvania {gauravsh, andresmf, blaze}@cis.upenn.edu
Add to Reading List

Document Date: 2006-08-07 14:09:37


Open Document

File Size: 484,00 KB

Share Result on Facebook

Company

IBM / Microsoft / /

/

Event

Natural Disaster / Man-Made Disaster / /

Facility

US Prison / Information Science University of Pennsylvania / /

IndustryTerm

covert network / digital input device / crypto systems / crypto algorithm / typical general purpose computing systems / less interactive network applications / Internet Destination Receiver / network computing applications / interactive network applications / web browsers / software-based network / hardware device / software trojan / input devices / coupled network / manufacturing process / input device / keylogger device / mix networks / software vulnerability / Internet Add Jitters JitterBug Sender Look / conventional computer systems / relay device / above applications / application software / cryptographic algorithms / usable and practical network / interactive network software / host software / external network / malicious covert network / web camera / attack tool / compromised input device / hardware interception device / e.g. software / /

NaturalFeature

Keyboard JitterBug channel / /

OperatingSystem

Linux / OpenBSD / FreeBSD / Microsoft Windows / /

Organization

University of Pennsylvania / Matt Blaze Department of Computer / Federal Bureau of Investigation / ASIC / /

Person

Scarfo / Matt Blaze / Andres Molina / /

Position

guard / keyboard controller / spy / controller / /

Product

Keyboard JitterBug / /

ProgrammingLanguage

C / /

ProvinceOrState

Pennsylvania / /

Technology

Linux / encoding algorithm / decoding algorithm / operating system / scheduling algorithm / Quality of Service / Application layer encryption / operating systems / TCP/IP / link layer encryption / PS/2 protocol / encryption / ASIC / ASCII / VOIP / crypto algorithm / flash / e.g. encryption / link encryption / /

SocialTag