European Interdisciplinary Cybersecurity Conference 2021
DOI: 10.1145/3487405.3487660
|View full text |Cite
|
Sign up to set email alerts
|

Reset- and Reconnection-based Covert Channels in CoAP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…For network steganography, there already exists a taxonomy of hiding patterns [5] that was enhanced over the years by several papers [2], [52]- [55]. In the remainder, we categorize all existing methods described by these earlier patterns into our taxonomy and derive domain-specific patterns as needed.…”
Section: A Network Steganography Sub-taxonomymentioning
confidence: 99%
“…For network steganography, there already exists a taxonomy of hiding patterns [5] that was enhanced over the years by several papers [2], [52]- [55]. In the remainder, we categorize all existing methods described by these earlier patterns into our taxonomy and derive domain-specific patterns as needed.…”
Section: A Network Steganography Sub-taxonomymentioning
confidence: 99%
“…Application Scenario: The method can be used for covert communication between one or more covert senders and receivers. In [55], the authors propose a data exfiltration scenario in an Operational Technology environment, where the covert sender has no access to the internet and transfers sensitive metadata to the receiver, who is connected to the internet and, thus, is able to exfiltrate the covert message to an external server. This scenario provides an uni-directional communication, but the channel can also be used in a bidirectional manner.…”
Section: Example For Network Steganography With An Indirect and Hybri...mentioning
confidence: 99%