M. Backes, M. Dürmuth, and D. Unruh, Compromising Reflections-or-How to Read LCD Monitors around the Corner, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.158-169, 2008.
DOI : 10.1109/SP.2008.25

M. Bauer, New covert channels in HTTP, Proceeding of the ACM workshop on Privacy in the electronic society , WPES '03, 2004.
DOI : 10.1145/1005140.1005152

URL : http://arxiv.org/abs/cs/0404054

M. Bond and R. Anderson, API-level attacks on embedded systems, Computer, vol.34, issue.10, pp.67-75, 2001.
DOI : 10.1109/2.955101

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.1908

K. Borders and A. Prakash, Quantifying Information Leaks in Outbound Web Traffic, 2009 30th IEEE Symposium on Security and Privacy, 2009.
DOI : 10.1109/SP.2009.9

A. Bortz and D. Boneh, Exposing private information by timing web applications, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.621-628, 2007.
DOI : 10.1145/1242572.1242656

L. Bowyer, Firewall bypass via protocol stenography, 2002.

S. Chen, R. Wang, X. Wang, and K. Zhang, Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow, 2010 IEEE Symposium on Security and Privacy, p.5, 2010.
DOI : 10.1109/SP.2010.20

. Cyberiapc and . Com, Zenith picture gallery, 2007.

E. W. Felten and M. A. Schneider, Timing attacks on Web privacy, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, 2000.
DOI : 10.1145/352600.352606

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.6864

R. A. Kemmerer, Shared resource matrix methodology: an approach to identifying storage and timing channels, ACM Transactions on Computer Systems, vol.1, issue.3, pp.256-277, 1983.
DOI : 10.1145/357369.357374

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.462.316

Z. Kwecka, Application layer covert channel -analysis and detection, 2006.

B. W. Lampson, A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973.
DOI : 10.1145/362375.362389

E. W. Myers, AnO(ND) difference algorithm and its variations, Algorithmica, vol.21, issue.1, pp.251-266, 1986.
DOI : 10.1109/TSE.1975.6312866

Y. Nagami, D. Miyamoto, H. Hazeyama, and Y. Kadobayashi, An Independent Evaluation of Web Timing Attack and its Countermeasure, 2008 Third International Conference on Availability, Reliability and Security, pp.1319-1324, 2008.
DOI : 10.1109/ARES.2008.111

D. Of-defense and . Standard, Department of Defense Trusted Computer System Evaluation Criteria, 1985.