A Covert Timing Channel Based on Fountain Codes, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp.2012-970, 2012. ,
DOI : 10.1109/TrustCom.2012.21
Detection of covert channel encoding in network packet delays, p.19, 2005. ,
IP covert timing channels, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.178-187, 2004. ,
DOI : 10.1145/1030083.1030108
Detecting covert timing channels with time-deterministic replay, Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation, pp.541-55414, 2014. ,
Network covert channels on the Android platform, Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW '11, pp.1-61, 2011. ,
DOI : 10.1145/2179298.2179367
An Entropy-Based Approach to Detecting Covert Timing Channels, IEEE Transactions on Dependable and Secure Computing, vol.8, issue.6, pp.785-797, 2011. ,
DOI : 10.1109/TDSC.2010.46
URL : http://www.cs.wm.edu/~hnw/paper/tdsc10.pdf
Model-Based Covert Timing Channels: Automated Modeling and Evasion, Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection, pp.211-230, 2008. ,
DOI : 10.1007/978-3-540-87403-4_12
URL : http://www.cs.wm.edu/~hnw/paper/raid08.pdf
Covert Channels in LAN's, IEEE Transactions on Software Engineering, vol.13, issue.2, 1987. ,
DOI : 10.1109/TSE.1987.233153
Covert DCF: A DCF-Based Covert Timing Channel in 802.11 Networks, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp.570-579, 2011. ,
DOI : 10.1109/MASS.2011.60
DAT detectors: uncovering TCP/IP covert channels by descriptive analytics, sec, pp.3011-30291531, 2016. ,
DOI : 10.1109/TE.2015.2417512
Generalization and decision tree induction: efficient classification in data mining, Proceedings Seventh International Workshop on Research Issues in Data Engineering. High Performance Database Management for Large-Scale Applications, pp.111-120, 1997. ,
DOI : 10.1109/RIDE.1997.583715
URL : http://www-faculty.cs.uiuc.edu/~hanj/pdf/ride97.pdf
Covert timing channels codes for communication over interactive traffic, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.1485-1488, 2009. ,
DOI : 10.1109/ICASSP.2009.4959876
Tcp covert timing channels: Design and detection, IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), pp.420-429, 2008. ,
Steganography of VoIP Streams, pp.1001-1018, 2008. ,
DOI : 10.1109/SECCOM.2007.4550357
Limitations of end-to-end encryption in secure computer networks, pp.78-158 ,
DOI : 10.21236/ADA059221
A review of feature selection techniques in bioinformatics, Bioinformatics, vol.23, issue.19, pp.2507-2517, 2007. ,
DOI : 10.1093/bioinformatics/btm344
Keyboards and covert channels, Proceedings of the 15th Conference on USENIX Security Symposium -Volume USENIX- SS'06, USENIX Association, 2006. ,
Optimization of covert channel identification, Security in Storage Workshop, 2005. SISW '05. Third IEEE International, pp.13-95, 2005. ,
A Support Vector Machine-Based Framework for Detection of Covert Timing Channels, IEEE Transactions on Dependable and Secure Computing, vol.13, issue.2, pp.274-283, 2016. ,
DOI : 10.1109/TDSC.2015.2423680
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine TU Wien CN Group: Data Analysis and Algorithms (2017), https://www.cn.tuwien.ac.at/public/data.html 23 Liquid: A detection-resistant covert timing channel based on {IPD} shaping, Computer Networks, vol.22, issue.556, pp.313-324, 2003. ,
Pattern-Based Survey and Categorization of Network Covert Channel Techniques, ACM Computing Surveys, vol.47, issue.3, pp.1-5026, 2015. ,
DOI : 10.1007/11553939_151
An Analysis of Covert Timing Channels, Journal of Computer Security, vol.1, issue.3-4, pp.219-232, 1992. ,
DOI : 10.3233/JCS-1992-13-403
Improving performance of network covert timing channel through Huffman coding, Advanced Theory and Practice for Cryptography and Future Security, pp.69-79, 2012. ,
DOI : 10.1016/j.mcm.2011.01.051
An Empirical Evaluation of IP Time To Live Covert Channels, 2007 15th IEEE International Conference on Networks, pp.42-47, 2007. ,
DOI : 10.1109/ICON.2007.4444059
A survey of covert channels and countermeasures in computer network protocols, IEEE Communications Surveys & Tutorials, vol.9, issue.3, pp.44-57, 2007. ,
DOI : 10.1109/COMST.2007.4317620
Stealthier Inter-packet Timing Covert Channels, Proceedings of the 10th International IFIP TC 6 Conference on Networking -Volume Part I, pp.458-47011, 2011. ,
DOI : 10.1007/978-3-642-20757-0_36
URL : https://hal.archives-ouvertes.fr/hal-01583422
Entropy based taxonomy of network convert channels, 2009 2nd International Conference on Power Electronics and Intelligent Transportation System (PEITS), pp.451-455, 2009. ,
DOI : 10.1109/PEITS.2009.5406973
Implementing a passive network covert timing channel, Computers & Security, vol.29, issue.6, pp.686-696, 2010. ,
DOI : 10.1016/j.cose.2009.12.010