نتایج جستجو برای: covert repair hypothesis

تعداد نتایج: 355225  

Journal: :I. J. Network Security 2012
Ping Dong Huanyan Qian Zhongjun Lu Shaohua Lan

A network covert channel violates security rules and leaks information imperceptibly. Many researchers have been studying how to construct it, and the basic methods involve exploiting packets head, packets sorting and packets timing, etc. To construct a more secret covert channel, this paper proposes a novel approach based on packet classification. With this method, covert information is encode...

2000
Yonglak Sohn Songchun Moon

While the secure transaction schedulers in multilevel secure database systems synchronize transactions cleared at different security levels, they must consider the problem of covert channel. Through the covert channel, malicious users leak secret information in a way of intentional interference among the transactions that they invoked. Much work had been done for closing the covert channel. Alt...

Journal: :Security and Communication Networks 2014
JingZheng Wu Liping Ding Yanjun Wu Nasro Min-Allah Samee Ullah Khan Yongji Wang

Cloud computing is becoming increasingly popular because of the dynamic deployment of computing service. Another advantage of cloud is that data confidentiality is protected by the cloud provider with the virtualization technology. However, a covert channel can break the isolation of the virtualization platform and leak confidential information without letting it known by virtual machines. In t...

2012
Alexis D. J. Makin Ellen Poliakoff Rochelle Ackerley Wael El-Deredy

Attention can be directed to particular spatial locations, or to objects that appear at anticipated points in time. While most work has focused on spatial or temporal attention in isolation, we investigated covert tracking of smoothly moving objects, which requires continuous coordination of both. We tested two propositions about the neural and cognitive basis of this operation: first that cove...

پایان نامه :0 1374

the aim of this study has been to find answers for the following questions: 1. what is the effect of immediate correction on students pronunciation errors? 2. what would be the effect of teaching the more rgular patterns of english pronunciation? 3. is there any significant difference between the two methods of dealing with pronuciation errore, i. e., correction and the teaching of the regular ...

2011
M. A. Ngadi S. N. Omar I. Ahmedy

Covert Channel are the methods to conceal a message in the volatile medium carrier such as radio signal and network packets. Until now, covert channels based on the packet length produce abnormal packet length when the length of the message is long. Abnormal packet length, especially in the normal network will expose the covert channels to network security perimeter. Therefore, it motivates the...

1994
James W. Gray

We identify a class of covert timing channels with the following properties. (1) existing covert timing channel analysis techniques are inappropriate for the channels in this class; and (2) it includes the fastest (i.e., highest capacity) covert channels known to date. Since channels in this class are exploited by counting the occurrences of certain events, we call them counting channels. We de...

2009
Yali Liu Dipak Ghosal Frederik Armknecht Ahmad-Reza Sadeghi Steffen Schulz Stefan Katzenbeisser

Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Previous results used encoding mechanisms that are either easy to detect with statistical analysis, thus spoiling the purpose of a covert channel, and/or are highly sensitive to channel noise, rendering them useless in practice. ...

Journal: :Advances in research ethics and integrity 2021

Abstract Covert research has a mixed reputation within the scientific community. Some are unsure of its moral worth, others would proscribe it entirely. This stems largely from lack knowledge about reasons for choosing covert method. In this chapter, these will be reconstructed in detail and all elements that allow one to judge level ethicality laid out reader. particular, chapter answer follow...

Journal: :Security and Communication Networks 2016
Lina Wang Weijie Liu Neeraj Kumar Debiao He Cheng Tan Debin Gao

Covert channel is a major threat to the information system security and commonly found in operating systems, especially in cloud computing environment. Owing to the characteristics in cloud computing environment such as resources sharing and logic boundaries, covert channels become more varied and difficult to find. Focusing on those problems, this paper presents a universal method for detectin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید