DOI: 10.17760/d20294146
|View full text |Cite
|
Sign up to set email alerts
|

Covert channels in modern computer systems : the cases of mobile and cloud

Abstract: Covert Channels have existed for centuries, from the time of Histiaeus to the modern day. Like its historical roots, the modern covert channel's life cycle consists of identifying new attack vectors, developing countermeasures and continuing with the next thrust and parry cycle. The front line in this conflict now includes mobile devices and cloud computing centers. with valuable content, exploits shared resources on a cloud server. We demonstrated this stealthy timing channel attack achieving worst case nativ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 35 publications
(42 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?