نتایج جستجو برای: covert index
تعداد نتایج: 400911 فیلتر نتایج به سال:
Demonstration of A Novel Storage Covert Channel on Android Smartwatch Using Status Bar Notifications
Covert channels have been used as a means to circumvent security measures and leak sensitive data undetectable to an onlooker. While these channels have been used in a lot of networks, their applications on mobile devices have just started to be seen. Recently, many covert channels in Android systems have been presented utilizing various available system resources. This demo aims to show how a ...
The detection of covert channels has quickly become a vital need due to their pervasive nature and the increasing popularity of the Internet. In recent years, new and innovative methods have been proposed to aid in the detection of covert channels. Existing detection schemes are often too specific and are ineffective against new covert channels. In this paper, we expound upon previous work done...
This study examined developmental trends in object and spatial working memory (WM) using heart rate (HR) to provide an index of covert cognitive processes. Participants in 4 age groups (6-7, 9-10, 11-12, 18-26, n=20 each) performed object and spatial WM tasks, in which each trial was followed by feedback. Spatial WM task performance reached adult levels before object WM task performance. The di...
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as a solution for three critical stealth attacks in wireless networks. We focus on extracting traces of the 802.11 medium access control (MAC) protocol from the temporal arrival patterns of incoming traffic streams as seen on the wired side, to identify attacker behavior. Attacks addressed include ...
Watermarking has become a technology of choice for a broad range of multimedia copyright protection applications. Watermarks have also been used to embed formatindependent metadata in audio/video signals, in a way that is robust to common editing. In this paper, we present several novel mechanisms for effective encoding and detection of directsequence spread-spectrum watermarks in audio signals...
Covert computation (of general functions) strengthens the notion of secure computation so that the computation hides not only everything about the participants’ inputs, except for what is revealed by the function output, but it also hides the very fact that the computation is taking place, by ensuring that protocol participants are indistinguishable from random beacons, except when the function...
Background and aims: The main objective of this research was finding the relations between musculoskeletal disorders and depression and anxiety (overt and covert) in emergency staff of hospitals covered by Shahid Beheshti University of Medical Sciences. Methods: The research was descriptive- analytical study. Out of 600 staff of hospitals covered by Shahid Beheshti University of Medical Science...
T s s a target itself. Another example is to guard a secured environment, where it is important to be covert as well as overt at the same time, in this way the chances are higher for the robot to see an intruder before the opposite happens. A covert robot may be used as well for hostage rescue, for example by sending an insect size covert robot with a camera to the hostage area to send images t...
Covert network timing channels control time between transmissions of packets in overt network communication and transmits hidden messages. This paper presents an overview of different concepts of covert timing channels such as types, features and properties. There is range of terms used for security of information such as encryption, covert channels, network steganography or information hiding ...
This paper presents a new behavior based covert channel utilizing the database update mechanism of anti-virus software. It is highly covert due to unattended, frequent, automatic signature database update operations performed by the software. The design of the covert channel is described; its properties are discussed and demonstrated by a reference implementation. This paper uses these points t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید