共 50 条
- [21] Undermining Isolation Through Covert Channels in the Fiasco.OC Microkernel INFORMATION SCIENCES AND SYSTEMS 2015, 2016, 363 : 147 - 156
- [22] TACAN: Transmitter Authentication through Covert Channels in Controller Area Networks ICCPS '19: PROCEEDINGS OF THE 2019 10TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, 2019, : 23 - 34
- [23] The dilemma of covert channels searching INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005, 2006, 3935 : 169 - 174
- [24] Concurrent Covert Communication Channels ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 203 - +
- [25] Data exfiltration and covert channels SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31)TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE V, 2006, 6201
- [27] Multiple access covert channels Proceedings of the IASTED International Conference on Communication, Network, and Information Security, 2005, : 182 - 188
- [28] Characterization of Covert Channels in DNS 2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
- [30] Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 843 - 857