2019 IEEE 37th International Conference on Computer Design (ICCD) 2019
DOI: 10.1109/iccd46524.2019.00045
|View full text |Cite
|
Sign up to set email alerts
|

Covert Data Exfiltration Using Light and Power Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…Covert channels have been proposed for several domains. For instance, Carrara and Adams surveyed out-of-band covert channels over physical media, such as light, sound and air [13] while other authors analyzed details of such channels, e.g., Hanspach and Goetz [14], Cronin et al [15] and Matyunin et al [16]. Network covert channel techniques have been summarized by Mazurczyk et al [17], Wendzel et al [9] and Zander et al [18].…”
Section: Related Workmentioning
confidence: 99%
“…Covert channels have been proposed for several domains. For instance, Carrara and Adams surveyed out-of-band covert channels over physical media, such as light, sound and air [13] while other authors analyzed details of such channels, e.g., Hanspach and Goetz [14], Cronin et al [15] and Matyunin et al [16]. Network covert channel techniques have been summarized by Mazurczyk et al [17], Wendzel et al [9] and Zander et al [18].…”
Section: Related Workmentioning
confidence: 99%