Compromising Reflections-or-How to Read LCD Monitors around the Corner, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.158-169, 2008. ,
DOI : 10.1109/SP.2008.25
New covert channels in HTTP, Proceeding of the ACM workshop on Privacy in the electronic society , WPES '03, 2004. ,
DOI : 10.1145/1005140.1005152
URL : http://arxiv.org/abs/cs/0404054
API-level attacks on embedded systems, Computer, vol.34, issue.10, pp.67-75, 2001. ,
DOI : 10.1109/2.955101
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.1908
Quantifying Information Leaks in Outbound Web Traffic, 2009 30th IEEE Symposium on Security and Privacy, 2009. ,
DOI : 10.1109/SP.2009.9
Exposing private information by timing web applications, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.621-628, 2007. ,
DOI : 10.1145/1242572.1242656
Firewall bypass via protocol stenography, 2002. ,
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow, 2010 IEEE Symposium on Security and Privacy, p.5, 2010. ,
DOI : 10.1109/SP.2010.20
Zenith picture gallery, 2007. ,
Timing attacks on Web privacy, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, 2000. ,
DOI : 10.1145/352600.352606
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.6864
Shared resource matrix methodology: an approach to identifying storage and timing channels, ACM Transactions on Computer Systems, vol.1, issue.3, pp.256-277, 1983. ,
DOI : 10.1145/357369.357374
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.462.316
Application layer covert channel -analysis and detection, 2006. ,
A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973. ,
DOI : 10.1145/362375.362389
AnO(ND) difference algorithm and its variations, Algorithmica, vol.21, issue.1, pp.251-266, 1986. ,
DOI : 10.1109/TSE.1975.6312866
An Independent Evaluation of Web Timing Attack and its Countermeasure, 2008 Third International Conference on Availability, Reliability and Security, pp.1319-1324, 2008. ,
DOI : 10.1109/ARES.2008.111
Department of Defense Trusted Computer System Evaluation Criteria, 1985. ,