نتایج جستجو برای: covert index

تعداد نتایج: 400911  

1994
James W. Gray

We identify a class of covert timing channels with the following properties. (1) existing covert timing channel analysis techniques are inappropriate for the channels in this class; and (2) it includes the fastest (i.e., highest capacity) covert channels known to date. Since channels in this class are exploited by counting the occurrences of certain events, we call them counting channels. We de...

2009
Yali Liu Dipak Ghosal Frederik Armknecht Ahmad-Reza Sadeghi Steffen Schulz Stefan Katzenbeisser

Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Previous results used encoding mechanisms that are either easy to detect with statistical analysis, thus spoiling the purpose of a covert channel, and/or are highly sensitive to channel noise, rendering them useless in practice. ...

Journal: :Advances in research ethics and integrity 2021

Abstract Covert research has a mixed reputation within the scientific community. Some are unsure of its moral worth, others would proscribe it entirely. This stems largely from lack knowledge about reasons for choosing covert method. In this chapter, these will be reconstructed in detail and all elements that allow one to judge level ethicality laid out reader. particular, chapter answer follow...

Journal: :Security and Communication Networks 2016
Lina Wang Weijie Liu Neeraj Kumar Debiao He Cheng Tan Debin Gao

Covert channel is a major threat to the information system security and commonly found in operating systems, especially in cloud computing environment. Owing to the characteristics in cloud computing environment such as resources sharing and logic boundaries, covert channels become more varied and difficult to find. Focusing on those problems, this paper presents a universal method for detectin...

2006
Serdar Cabuk C. W. Clifton N. B. Shroff V. Balakrishnan

Cabuk, Serdar Ph.D., Purdue University, December, 2006. Network Covert Channels: Design, Analysis, Detection, and Elimination. Major Professors: Carla E. Brodley and Eugene H. Spafford. Indirect communication channels have been effectively employed in the communications world to bypass mechanisms that do not permit direct communication between unauthorized parties. Such covert channels emerge a...

2012
Zhenyu Wu Zhang Xu Haining Wang

Information security and privacy in general are major concerns that impede enterprise adaptation of shared or public cloud computing. Specifically, the concern of virtual machine (VM) physical co-residency stems from the threat that hostile tenants can leverage various forms of side channels (such as cache covert channels) to exfiltrate sensitive information of victims on the same physical syst...

2006
Serdar Cabuk C. W. Clifton N. B. Shroff V. Balakrishnan

Cabuk, Serdar Ph.D., Purdue University, December, 2006. Network Covert Channels: Design, Analysis, Detection, and Elimination. Major Professors: Carla E. Brodley and Eugene H. Spafford. Indirect communication channels have been effectively employed in the communications world to bypass mechanisms that do not permit direct communication between unauthorized parties. Such covert channels emerge a...

Journal: :Physical Review Letters 2016

Journal: :Archives of Disease in Childhood 2000

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید