2011
DOI: 10.1016/j.cose.2010.10.005
|View full text |Cite
|
Sign up to set email alerts
|

Designing a cluster-based covert channel to evade disk investigation and forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
25
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(26 citation statements)
references
References 10 publications
0
25
0
Order By: Relevance
“…Recent research related to slack space has examined the use of file fragmentation to hide data in FAT partitions [10]. FragFS [14] uses slack space in $MFT entries to hide data, leveraging the fact that $MFT entries commonly have a fixed length of 1,024 bytes per entry.…”
Section: Related Workmentioning
confidence: 99%
“…Recent research related to slack space has examined the use of file fragmentation to hide data in FAT partitions [10]. FragFS [14] uses slack space in $MFT entries to hide data, leveraging the fact that $MFT entries commonly have a fixed length of 1,024 bytes per entry.…”
Section: Related Workmentioning
confidence: 99%
“…Indirect technique substituted the symbols with the property of the packets whereas the direct technique directly embeds the data into the field of the packet [5]. The subsequent study in this paper is based on indirect method refer to packet lengths.…”
Section: Introductionmentioning
confidence: 99%
“…Castiglione et al [6] proposed an asynchronous covert channel to deploy robust secret communication through spam e-mails. Khan et al [9] designed a cluster-based covert channel to evade disk investigation and forensics attempts. The proposed covert channel does not require additional storage on the filesystem and hence minimizes the likelihood of detection.…”
Section: Introductionmentioning
confidence: 99%