S. Castro, cctt (covert channel testing tool) v0.1.8 http://grayworld .net/it/pr cctt.shtml, 2003.

S. Castro, Covert Channel and tunneling over the HTTP protocol detection: GW implementation theoretical design, 2003.

K. Born, Browser-Based Covert Data Exfiltration, Proc. 9th Annual Security Conference, 2010.

B. W. Lampson, A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973.
DOI : 10.1145/362375.362389

S. J. Murdoch, Covert channel vulnerabilities in anonymity systems, 2007.

C. Wonnemann, . R. Accorsi, and G. Müller, On Information Flow Forensics in Business Application Scenarios, 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009.
DOI : 10.1109/COMPSAC.2009.154

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.217.3176

J. Postel, Internet Control Message Protocol, DARPA Internet Program Protocol Specification, RFC, vol.793, 1983.

B. Ray and S. Mishra, A Protocol for Building Secure and Reliable Covert Channel, 2008 Sixth Annual Conference on Privacy, Security and Trust, pp.246-253, 2007.
DOI : 10.1109/PST.2008.26

S. Wendzel, Protocol Hopping Covert Channels, pp.20-21, 2008.
DOI : 10.1109/lcn.2012.6423628

K. Ahsan, Covert Channel Analysis and Data Hiding in TCP, 2002.

C. H. Rowland, Covert Channels in the TCP, IP Protocol Suite, First Monday, vol.2, issue.5, 1997.

C. Scott, Network Covert Channels: Review of Current State and Analysis of Viability of the use of X.509 Certificates for Covert Communications, 2008.

D. Hintz, Covert Channels in TCP and IP Headers, Presentation slides of the DEFCON 10 conference, 2002.

V. Berk, A. Giani, and G. Cybenko, Detection of Covert Channel Encoding in Network Packet Delays, 2005.

S. Cabuk, C. E. Brodley, and C. Shields, IP covert timing channels, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.178-187, 2004.
DOI : 10.1145/1030083.1030108

Y. A. Fadlalla, Approaches to Resolving Covert Storage Channels in Multilevel Secure Systems, 1996.

G. Fisk, M. Fisk, C. Papadopoulos, and J. Neil, Eliminating Steganography in Internet Traffic with Active Wardens, Proc. Information Hiding Conference 2003, pp.18-35, 2003.
DOI : 10.1007/3-540-36415-3_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.9486

W. Hu, Reducing Timing Charmers with Fuzzy Time, Symposium on Security and Privacy, pp.8-20, 1991.
DOI : 10.3233/jcs-1992-13-404

M. H. Kang and I. S. Moskowitz, A pump for rapid, reliable, secure communication, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.119-129, 1993.
DOI : 10.1145/168588.168604

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.1760

R. A. Kemmerer, Shared resource matrix methodology: an approach to identifying storage and timing channels, ACM Transactions on Computer Systems, vol.1, issue.3, pp.256-277, 1983.
DOI : 10.1145/357369.357374

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.462.316

R. A. Kemmerer and P. A. Porras, Covert flow trees: a visual approach to analyzing covert storage channels, IEEE Transactions on Software Engineering, vol.17, issue.11, pp.1166-1185, 1991.
DOI : 10.1109/32.106972

S. J. Murdoch and S. Lewis, Embedding Covert Channels into TCP/IP, Proc. Information Hiding, pp.247-261, 2005.
DOI : 10.1007/11558859_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.66.1389

M. Handley, V. Paxson, and C. Kreibich, Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics, Proc. 10th USENIX Security Symposium, pp.115-131, 2001.