Proceedings of the 11th ACM Conference on Computer and Communications Security 2004
DOI: 10.1145/1030083.1030108
|View full text |Cite
|
Sign up to set email alerts
|

IP covert timing channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
40
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 300 publications
(40 citation statements)
references
References 16 publications
0
40
0
Order By: Relevance
“…The predetermined time limit based technique [16], in which the packet has to be received within the defined time. Presence and absence of packet is mentioned in the form of '1' and '0' respectively.…”
Section: Timing Based Covert Channelmentioning
confidence: 99%
“…The predetermined time limit based technique [16], in which the packet has to be received within the defined time. Presence and absence of packet is mentioned in the form of '1' and '0' respectively.…”
Section: Timing Based Covert Channelmentioning
confidence: 99%
“…After a dummy packet is received, the mismatch between the hidden sender and hidden receiver takes place. To negotiate this fact SOF packets [25] are utilized after transferring T − 1 packets within a covert channel. A receiver fixes T −1 packets gained after SOF packet and waits for the next SOF packet.…”
Section: Related Workmentioning
confidence: 99%
“…Thereby, the existence of monitors in the targeted network can be compromised. To this end, the PN-code-based steganographic attack presented in our paper can be understood as a covert channel problem [10], because the attack traffic encoded by a signal blends into the background traffic and is only recognizable by the attacker which knows the secret pattern of the PN code.…”
Section: Related Workmentioning
confidence: 99%