Trojan Detection using IC Fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007. ,
DOI : 10.1109/SP.2007.36
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.123.467
Amazon Elastic Compute Cloud (Amazon EC2) ,
A survey of insider attack detection research, in Insider Attack and Cyber Security: Beyond the Hacker, pp.69-90, 2008. ,
Covert channel detection using process query systems, Proceedings of the Second Annual Workshop on Flow Analysis, 2005. ,
Siren: catching evasive malware, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.78-85, 2006. ,
DOI : 10.1109/SP.2006.37
Network Covert Channels: Design, Analysis, Detection and Elimination, 2006. ,
IP covert timing channels, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.178-187, 2004. ,
DOI : 10.1145/1030083.1030108
Nonparametric Statistics for Non- Statisticians: A Step-by-Step Approach, 2009. ,
DOI : 10.1002/9781118165881
Pattern Classification, 2001. ,
Eliminating Steganography in Internet Traffic with Active Wardens, Proceedings of the Fifth International Workshop on Information Hiding, pp.18-35, 2002. ,
DOI : 10.1007/3-540-36415-3_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.9486
Detecting covert timing channels, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.307-316, 2007. ,
DOI : 10.1145/1315245.1315284
Model-Based Covert Timing Channels: Automated Modeling and Evasion, Proceedings of the Eleventh International Symposium on Recent Advances in Intrusion Detection, pp.211-230, 2008. ,
DOI : 10.1007/978-3-540-87403-4_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.146.1352
Managing the risk of covert information flows in virtual machine systems, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.81-90, 2007. ,
DOI : 10.1145/1266840.1266853
Privacy oracle, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.279-288, 2008. ,
DOI : 10.1145/1455770.1455806
The pump: A decade of covert fun, Proceedings of the Twenty-First Annual Computer Security Applications Conference, pp.352-360, 2005. ,
An information-theoretic model for adaptive sidechannel attacks, Proceedings of the Fourteenth ACM Conference on Computer and Communications Security, pp.286-296, 2007. ,
SIDD: A framework for detecting sensitive data exfiltration by an insider attack, Proceedings of the Forty-Second Hawaii International Conference on System Sciences, 2009. ,
DOI : 10.1145/1413140.1413159
Relative fitness models for storage, ACM SIGMETRICS Performance Evaluation Review, vol.33, issue.4, pp.23-28, 2006. ,
DOI : 10.1145/1138085.1138092
Microsoft Azure Services Platform ,
Load-based covert channels between Xen virtual machines, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, pp.173-180, 2010. ,
DOI : 10.1145/1774088.1774125
On the secrecy of timing-based active watermarking trace-back techniques, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.334-349, 2006. ,
DOI : 10.1109/SP.2006.28
A First Step towards Live Botmaster Traceback, Proceedings of the Eleventh International Symposium on Recent Advances in Intrusion Detection, pp.59-77, 2008. ,
DOI : 10.1007/978-3-540-87403-4_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.212.210
Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212, 2009. ,
DOI : 10.1145/1653662.1653687
Predictable Design of Network-Based Covert Communication Systems, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.311-321, 2008. ,
DOI : 10.1109/SP.2008.26
Efficient and Robust TCP Stream Normalization, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.96-110, 2008. ,
DOI : 10.1109/SP.2008.27
NetSpy: Automatic Generation of Spyware Signatures for NIDS, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.99-108, 2006. ,
DOI : 10.1109/ACSAC.2006.34
Tracking anonymous peer-to-peer VoIP calls on the internet, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.81-91, 2005. ,
DOI : 10.1145/1102120.1102133
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.116-130, 2007. ,
DOI : 10.1109/SP.2007.30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.123.3789
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.20-29, 2003. ,
DOI : 10.1145/948109.948115
Covert and Side Channels Due to Processor Architecture, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.473-482, 2006. ,
DOI : 10.1109/ACSAC.2006.20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.190.1003