Covert channels in multiple access protocols
نویسندگان
چکیده
منابع مشابه
Covert Channels in Internet Protocols: A Survey
The creation of covert channels in public computer networks can prove an effective means of information hiding and secret communication. With the widespread adoption of the Internet the TCP/IP suite of protocols have become pervasive, and therefore an attractive target for covert channel exploitation. This paper gives a brief overview of covert channels in communication networks, and presents a...
متن کاملCovert channels detection in protocols using scenarios
This paper presents an approach to detect illegal information flows from requirements expressed as high-level scenarios.
متن کاملSystematic Engineering of Control Protocols for Covert Channels
Within the last years, new techniques for network covert channels arose, such as covert channel overlay networking, protocol switching covert channels, and adaptive covert channels. These techniques have in common that they rely on covert channel-internal control protocols (so called micro protocols) placed within the hidden bits of a covert channel’s payload. An adaptable approach for the engi...
متن کاملExtension of the Coverage Region of Multiple Access Channels by Using a Relay
From practical and theoretical viewpoints, performance analysis of communication systems by using information-theoretic results is important. In this paper, based on our previous work on Multiple Access Channel (MAC) and Multiple Access Relay Channel (MARC), we analyze the impact of a relay on the fundamental wireless communications concept, i.e., coverage region of MARC, as a basic model for u...
متن کاملCovert Channels | Here to Stay? Covert Channels | Here to Stay?
We discuss the di culties of satisfying high-assurance system requirements without sacri cing system capabilities. To alleviate this problem, we show how trade-o s can be made to reduce the threat of covert channels. We also clarify certain concepts in the theory of covert channels. Traditionally, a covert channel's vulnerability was measured by the capacity. We show why a capacity analysis alo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGCOMM Computer Communication Review
سال: 2011
ISSN: 0146-4833
DOI: 10.1145/2043164.2018490