cctt (covert channel testing tool) v0.1.8 http://grayworld .net/it/pr cctt.shtml, 2003. ,
Covert Channel and tunneling over the HTTP protocol detection: GW implementation theoretical design, 2003. ,
Browser-Based Covert Data Exfiltration, Proc. 9th Annual Security Conference, 2010. ,
A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973. ,
DOI : 10.1145/362375.362389
Covert channel vulnerabilities in anonymity systems, 2007. ,
On Information Flow Forensics in Business Application Scenarios, 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009. ,
DOI : 10.1109/COMPSAC.2009.154
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.217.3176
Internet Control Message Protocol, DARPA Internet Program Protocol Specification, RFC, vol.793, 1983. ,
A Protocol for Building Secure and Reliable Covert Channel, 2008 Sixth Annual Conference on Privacy, Security and Trust, pp.246-253, 2007. ,
DOI : 10.1109/PST.2008.26
Protocol Hopping Covert Channels, pp.20-21, 2008. ,
DOI : 10.1109/lcn.2012.6423628
Covert Channel Analysis and Data Hiding in TCP, 2002. ,
Covert Channels in the TCP, IP Protocol Suite, First Monday, vol.2, issue.5, 1997. ,
Network Covert Channels: Review of Current State and Analysis of Viability of the use of X.509 Certificates for Covert Communications, 2008. ,
Covert Channels in TCP and IP Headers, Presentation slides of the DEFCON 10 conference, 2002. ,
Detection of Covert Channel Encoding in Network Packet Delays, 2005. ,
IP covert timing channels, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.178-187, 2004. ,
DOI : 10.1145/1030083.1030108
Approaches to Resolving Covert Storage Channels in Multilevel Secure Systems, 1996. ,
Eliminating Steganography in Internet Traffic with Active Wardens, Proc. Information Hiding Conference 2003, pp.18-35, 2003. ,
DOI : 10.1007/3-540-36415-3_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.9486
Reducing Timing Charmers with Fuzzy Time, Symposium on Security and Privacy, pp.8-20, 1991. ,
DOI : 10.3233/jcs-1992-13-404
A pump for rapid, reliable, secure communication, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.119-129, 1993. ,
DOI : 10.1145/168588.168604
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.1760
Shared resource matrix methodology: an approach to identifying storage and timing channels, ACM Transactions on Computer Systems, vol.1, issue.3, pp.256-277, 1983. ,
DOI : 10.1145/357369.357374
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.462.316
Covert flow trees: a visual approach to analyzing covert storage channels, IEEE Transactions on Software Engineering, vol.17, issue.11, pp.1166-1185, 1991. ,
DOI : 10.1109/32.106972
Embedding Covert Channels into TCP/IP, Proc. Information Hiding, pp.247-261, 2005. ,
DOI : 10.1007/11558859_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.66.1389
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics, Proc. 10th USENIX Security Symposium, pp.115-131, 2001. ,