نتایج جستجو برای: covert index
تعداد نتایج: 400911 فیلتر نتایج به سال:
The existing literature on parental control and children's diets is confusing. The present paper reports two studies to explore an expanded conceptualisation of parental control with a focus on overt control which 'can be detected by the child' and covert control which 'cannot be detected by the child'. In study 1, 297 parents of children aged between 4 and 11 completed a measure of overt contr...
Proactive and reactive inhibition are generally intended as mechanisms allowing the withholding or suppression of overt movements. Nonetheless, inhibition could also play a pivotal role during covert actions (i.e., potential motor acts not overtly performed, despite the activation of the motor system), such as Motor Imagery (MI). In a previous EEG study, we analyzed cerebral activities reactive...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing channels use latency to carry data, and are the foundation for timing and cache-timing attacks. Covert storage channels instead utilize existing system bits to carry data, and are not historically used for cryptanalytic side-channel attacks. This paper introduces a new storage channel made available ...
We consider the problem of detecting covert channels within security-enforcing object-capability patterns. Traditional formalisms for reasoning about the security properties of object-capability patterns require one to be aware, a priori, of all possible mechanisms for covert information flow that might be present within a pattern, in order to detect covert channels within it. We show how the C...
This letter studies and compares the physical-layer security approach and the covert communication approach for a wiretap channel with a transmitter, an intended receiver and an eavesdropper. In order to make the comparison, we investigate the power allocation problems for maximizing the secrecy/covert rate subject to the transmit power constraint. Simulation results illustrate that if the eave...
BACKGROUND AND PURPOSE Unrecognized or unreported stroke-like symptoms, called covert symptoms, occur in persons free of clinical stroke. Whether covert symptoms are associated with subclinical brain infarcts (SBIs) is unknown. This study examined the association between covert stroke-like symptoms and SBI/stroke in persons with no history of stroke or transient ischemic attack. METHODS A tot...
Auditory perception and auditory imagery have been shown to activate overlapping brain regions. We hypothesized that these phenomena also share a common underlying neural representation. To assess this, we used electrocorticography intracranial recordings from epileptic patients performing an out loud or a silent reading task. In these tasks, short stories scrolled across a video screen in two ...
This paper uses jamming legitimate transmissions over a slotted ALOHA system as a means of covert communication. The resulting covert channel is found to be source dependent, and to have infinite memory. Hence, a characterization of the capacity of covert communication over such a medium is an inherently complex problem. Employing i.i.d. jamming strategies, this paper derives achievable rates f...
A Guide to Understanding Covert Channel Analysis of Trusted Systems provides a set of good practices related to covert channel analysis. We have written this guide to help the vendor and evaluator communities understand the requirements for covert channel analysis as described in the Department of Defense Trusted Computer System Evaluation Criteria (TCSEC). In an effort to provide guidance, we ...
In this paper a new way of exchanging information for Voice over Internet Protocol (VoIP) service is presented. With use of digital watermarking and steganography techniques we achieve a covert channel which can be used for different purposes e.g. to improve IP Telephony security or to alternate existing protocols like RTCP (Real-Time Control Protocol). Main advantage of this solution is that i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید