D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, Trojan Detection using IC Fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007.
DOI : 10.1109/SP.2007.36

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.123.467

. Amazon, Amazon Elastic Compute Cloud (Amazon EC2)

M. B. Salem, S. Hershkop, and S. Stolfo, A survey of insider attack detection research, in Insider Attack and Cyber Security: Beyond the Hacker, pp.69-90, 2008.

V. Berk, A. Giani, and G. Cybenko, Covert channel detection using process query systems, Proceedings of the Second Annual Workshop on Flow Analysis, 2005.

K. Borders, X. Zhao, and A. Prakash, Siren: catching evasive malware, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.78-85, 2006.
DOI : 10.1109/SP.2006.37

S. Cabuk, Network Covert Channels: Design, Analysis, Detection and Elimination, 2006.

S. Cabuk, C. Brodley, and C. Shields, IP covert timing channels, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.178-187, 2004.
DOI : 10.1145/1030083.1030108

G. Corder and D. Foreman, Nonparametric Statistics for Non- Statisticians: A Step-by-Step Approach, 2009.
DOI : 10.1002/9781118165881

R. Duda, P. Hart, and D. Stork, Pattern Classification, 2001.

G. Fisk, M. Fisk, C. Papadopoulos, and J. Neil, Eliminating Steganography in Internet Traffic with Active Wardens, Proceedings of the Fifth International Workshop on Information Hiding, pp.18-35, 2002.
DOI : 10.1007/3-540-36415-3_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.9486

S. Gianvecchio and H. Wang, Detecting covert timing channels, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.307-316, 2007.
DOI : 10.1145/1315245.1315284

S. Gianvecchio, H. Wang, D. Wijesekera, and S. Jajodia, Model-Based Covert Timing Channels: Automated Modeling and Evasion, Proceedings of the Eleventh International Symposium on Recent Advances in Intrusion Detection, pp.211-230, 2008.
DOI : 10.1007/978-3-540-87403-4_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.146.1352

T. Jaeger, R. Sailer, and Y. Sreenivasan, Managing the risk of covert information flows in virtual machine systems, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.81-90, 2007.
DOI : 10.1145/1266840.1266853

J. Jung, A. Sheth, B. Greenstein, D. Wetherall, G. Maganis et al., Privacy oracle, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.279-288, 2008.
DOI : 10.1145/1455770.1455806

M. Kang, I. Moskowitz, and S. Chincheck, The pump: A decade of covert fun, Proceedings of the Twenty-First Annual Computer Security Applications Conference, pp.352-360, 2005.

B. Kopf and D. Basin, An information-theoretic model for adaptive sidechannel attacks, Proceedings of the Fourteenth ACM Conference on Computer and Communications Security, pp.286-296, 2007.

Y. Liu, C. Corbett, K. Chiang, R. Archibald, B. Mukherjee et al., SIDD: A framework for detecting sensitive data exfiltration by an insider attack, Proceedings of the Forty-Second Hawaii International Conference on System Sciences, 2009.
DOI : 10.1145/1413140.1413159

M. Mesnier, M. Wachs, B. Salmon, and G. Ganger, Relative fitness models for storage, ACM SIGMETRICS Performance Evaluation Review, vol.33, issue.4, pp.23-28, 2006.
DOI : 10.1145/1138085.1138092

. Microsoft, Microsoft Azure Services Platform

K. Okamura and Y. Oyama, Load-based covert channels between Xen virtual machines, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, pp.173-180, 2010.
DOI : 10.1145/1774088.1774125

P. Peng, P. Ning, and D. Reeves, On the secrecy of timing-based active watermarking trace-back techniques, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.334-349, 2006.
DOI : 10.1109/SP.2006.28

D. Ramsbrock, X. Wang, and X. Jiang, A First Step towards Live Botmaster Traceback, Proceedings of the Eleventh International Symposium on Recent Advances in Intrusion Detection, pp.59-77, 2008.
DOI : 10.1007/978-3-540-87403-4_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.212.210

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212, 2009.
DOI : 10.1145/1653662.1653687

R. Smith, G. Scott, and . Knight, Predictable Design of Network-Based Covert Communication Systems, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.311-321, 2008.
DOI : 10.1109/SP.2008.26

M. Vutukuru, H. Balakrishnan, and V. Paxson, Efficient and Robust TCP Stream Normalization, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.96-110, 2008.
DOI : 10.1109/SP.2008.27

H. Wang, S. Jha, and V. Ganapathy, NetSpy: Automatic Generation of Spyware Signatures for NIDS, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.99-108, 2006.
DOI : 10.1109/ACSAC.2006.34

X. Wang, S. Chen, and S. Jajodia, Tracking anonymous peer-to-peer VoIP calls on the internet, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.81-91, 2005.
DOI : 10.1145/1102120.1102133

X. Wang, S. Chen, and S. Jajodia, Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.116-130, 2007.
DOI : 10.1109/SP.2007.30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.123.3789

X. Wang and D. Reeves, Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.20-29, 2003.
DOI : 10.1145/948109.948115

Z. Wang and R. Lee, Covert and Side Channels Due to Processor Architecture, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.473-482, 2006.
DOI : 10.1109/ACSAC.2006.20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.190.1003