, formation Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures, 2016.
Information hiding as a challenge for malware detection, IEEE Secur. Priv, vol.13, issue.2, pp.89-93, 2015. ,
Hidden and uncontrolled -on the emergence of network steganographic threats, ISSE 2014 Securing Electronic Business Processes, pp.123-133, 2014. ,
A survey of covert channels and countermeasures in computer network protocols, Comm. Surveys and Tutorials, vol.9, issue.3, pp.44-57, 2007. ,
The new threats of information hiding: The road ahead, IEEE IT Prof, vol.20, issue.3, pp.31-39, 2018. ,
Information hiding: Challenges for forensic experts, Commun. ACM, vol.61, issue.1, pp.86-94, 2018. ,
Eliminating steganography in internet traffic with active wardens, Proc. Int. Workshop Information Hiding, IH'02, pp.18-35, 2002. ,
On the limits of steganography, IEEE J. Sel. Areas Commun, vol.16, issue.4, pp.474-481, 1998. ,
, International Workshop on Privacy Enhancing Technologies, pp.147-166, 2005.
Covert channels in LAN protocols, Local Area Network Security, pp.89-101, 1989. ,
Practical internet steganography: Data hiding in IP, Proc. Texas Workshop on Security of Information Systems, 2003. ,
Towards adaptive covert communication system, Proc. Pacific Rim International Symposium on Dependable Computing, pp.153-159, 2008. ,
Covert channels in TCP/IP protocol stack -extended version, Central Eur, J. Comput. Sci, vol.4, issue.2, pp.45-66, 2014. ,
Steganography in modern smartphones and mitigation techniques, IEEE Commun. Surv. Tutor, vol.17, issue.1, pp.334-357, 2015. ,
, Trends in steganography, vol.57, pp.86-95, 2014.
Pattern-based survey and categorization of network covert channel techniques, Comput. Surv, vol.47, issue.3, pp.1-50, 2015. ,
The prisoners' problem and the subliminal channel, Crypto '83, pp.51-67, 1984. ,
On public-key steganography in the presence of an active warden, Proc. Information Hiding Workshop, IH'98, pp.355-368, 1998. ,
Stealthier inter-packet timing covert channels, International Conference on Research in Networking, pp.458-470, 2011.,
URL : https://hal.archives-ouvertes.fr/hal-01583422
A study on the covert channel detection of TCP/IP header using support vector machine, Proc. 5th Int. Conf. Information and Comm. Security, pp.313-324, 2003. ,
Decision tree rule induction for detecting covert timing channels in TCP/IP traffic, International Cross-Domain Conference for Machine Learning and Knowledge Extraction, pp.105-122, 2017.,
URL : https://hal.archives-ouvertes.fr/hal-01677146
The problem of traffic normalization within a covert channel's network environment learning phase, Proc. Sicherheit, pp.149-161, 2012. ,
Preventing protocol switching covert channels, Int. J. Advances in Security, vol.5, issue.3&4, 2012. ,
, OpenBSD Project, OpenBSD pf FAQ
A framework for avoiding steganography usage over HTTP, J. Netw. Comput. Appl, vol.35, issue.1, pp.491-501, 2012. ,
Detecting protocol switching covert channels, 37th IEEE Conf. on Local Computer Networks, pp.280-283, 2012. ,
Analyzing network-aware active wardens in IPv6, Proc. 8th Int. Workshop Information Hiding, IH'06, pp.58-77, 2006. ,
Active mapping: Resisting NIDS evasion without altering traffic, Proc. IEEE Symp. Security and Privacy, pp.44-61, 2003. ,
The parrot is dead: Observing unobservable network communications, Proc. 34th IEEE Symposium on Security and Privacy, pp.65-79, 2013. ,
Countermeasures for covert channel-internal control protocols, Proc. 10th Int. Conf. Availability, Reliability and Security, pp.422-428, 2015. ,
Dynamic routing in covert channel overlays based on control protocols, 2012 International Conference for Internet Technology and Secured Transactions, pp.32-39, 2012. ,
, Proceedings of the 11th ACM conference on Computer and Communications Security, pp.178-187, 2004.
Covert channels-here to stay, Proceedings of COMPASS'94 -IEEE 9th Annual Conference on Computer Assurance, pp.235-243, 1994. ,
Trust-MAS: Trusted communication platform for multi-agent systems, Proceedings of the OTM 2008 Confederated International Conferences, pp.1019-1035, 2008. ,
Defense on the move: Antbased cyber defense, Secur. Priv, vol.12, issue.2, pp.36-43, 2014. ,
, Proceedings of the IEEE Symposium on Foundations of Computer Science, pp.271-280, 2002.
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics, Proc. USENIX Security Symp, pp.115-131, 2001. ,
The energy impact of security mechanisms in modern mobile devices, Netw. Secur, vol.2012, issue.2, pp.70015-70021, 2012. ,
Wojciech Mazurczyk received the Ph.D. and D.Sc. degrees all in Telecommunications from the Warsaw University of Technology (WUT), Poland. He is currently an Associate Professor at the Institute of Telecommunications in the Faculty of Electronics and Information Technology at WUT. He is the head of the Bio-inspired Security Research Group (BSRG) at WUT. He is also a Researcher at the Parallelism and VLSI Group at Faculty of Mathematics and Computer Science at FernUniversitaet, Germany. His research interests include network security, information hiding, and network forensics, A survey on energy-aware security mechanisms, vol.24, pp.77-90, 2015. ,