As part of a broader organisational restructure, data networking research at Swinburne University of Technology has moved from the Centre for Advanced Internet Architecture (CAIA) to the Internet For Things (I4T) Research Lab.

Although CAIA no longer exists, this website reflects CAIA's activities and outputs between March 2002 and February 2017, and is being maintained as a service to the broader data networking research community.

Covert Channels Bibliography

A list of publications that discuss covert channels in general or are focussed on inter-process covert channels on a single computer. For other types of covert channels please go to my main covert channels page.

It is very likely that this list is incomplete. Also there may be errors. If you find errors or know relevant publications not yet listed on this page please drop me an email!


[1] M. Salaün. Practical Overview of a Xen Covert Channel. J. Comput. Virol., 6:317-328, November 2010. [ .pdf ]
[2] C. Soghoian, S. Stamm. Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL. April 2010. [ .pdf ]
[3] D. V. Bailey, D. Boneh, E.-J. Goh, A. Juels. Covert Channels in Privacy-preserving Identification Systems. In Proceedings of the 14th ACM conference on Computer and communications security, CCS '07, pages 297-306. ACM, 2007. [ http ]
[4] T. Jaeger, R. Sailer, Y. Sreenivasan. Managing the Risk of Covert Information Flows in Virtual Machine Systems. In Proceedings of the 12th ACM symposium on Access control models and technologies, SACMAT '07, pages 81-90. ACM, 2007. [ .pdf ]
[5] Z. Wang, R. Lee. How Security Models and Processor Architecture Affect Covert Channels. In Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC), pages 473-482, December 2006. [ .pdf ]
[6] N. Nagatou, T. Watanabe. Run-Time Detection of Covert Channels. In Proceedings of First International Conference on Availability, Reliability and Security (ARES), pages 577-584, April 2006. [ http ]
[7] A. Pfitzmann, M. Hansen. Anonymity, Unlinkability, Unobservability, Pseudonimity, and Identity Management - A Consolidated Proposal for Terminology. Technical report, TU Dresden, Germany, February 2006. http://dud.inf.tu-dresden.de/Anon_Terminology.shtml. [ http ]
[8] J. C. Hernandez-Castro, I. Blasco-Lopez, J. M. Estevez-Tapiador, A. Ribagorda-Garnacho. Steganography in Games: A General Methodology and its Application to the Game of Go. Computers & Security, 25(1):64-71, February 2006. [ http ]
[9] Wikipedia. Covert Channel Wikipedia Definition, 2006. http://en.wikipedia.org/wiki/Covert_channel. [ http ]
[10] R. Bidou, F. Raynal. Covert Channels, November 2005. http://www.iv2-technologies.com/~rbidou/CovertChannels.pdf. [ .pdf ]
[11] Z. Wang, R. Lee. New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation. In Proceedings of the 8th Information Security Conference (ISC '05), pages 498-505, September 2005. [ .pdf ]
[12] W. Oblitey, J. L. Wolfe, S. Ezekiel. Covert Channels: The State of the Practice, August 2005. http://www.cosc.iup.edu/sezekiel/Publications/CovertChannels-Intro.doc. [ http ]
[13] A. B. Wagner, V. Anantharam. Information theory of covert timing channels. In Proceedings of the 2005 NATO/ASI Workshop on Network Security and Intrusion Detection, 2005. [ .pdf ]
[14] Z. Wang, R. B. Lee. Capacity Estimation of Non-Synchronous Covert Channels. In Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS), pages 170-176, 2005. [ .pdf ]
[15] R. Lanotte, A. Maggiolo-Schettini, S. Tini, A. Troina, E. Tronci. Automatic Covert Channel Analysis of a Multilevel Secure Component. In Proceedings of 6th International Conference on Information and Communications Security (ICICS), pages 249-261, October 2004. [ .pdf ]
[16] S. J. Murdoch, P. Zielinski. Covert Channels for Collusion in Online Computer Games. In Proceedings of 6th Information Hiding Workshop. Springer, May 2004. [ .pdf ]
[17] Information Assurance (IA) Implementation. Instruction 8500.2, U.S. Department of Defense, Feb. 2003. [ .pdf ]
[18] R. Anderson, M. Bond. Protocol analysis, composability and computation. Technical report, University of Cambridge, England, Feb. 2003. [ .pdf ]
[19] R. A. Kemmerer. A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. In Proceedings of Annual Computer Security Applications Conference (ACSAC), pages 109-118, December 2002. [ http ]
[20] L. Bowyer. Steganographied file transfer using posix file locks, September 2002. http://www.networkpenetration.com/adv_steg_posix_flock.html. [ .html ]
[21] M. Owens. A Discussion of Covert Channels and Steganography. Technical report, SANS Technology Institute, March 2002. http://www.sans.org/rr/papers/download.php?id=678&c=90f3e1e60e2f74555da474d46c027579. [ http ]
[22] Gavin Lowe. Quantifying Information Flow. In 15th IEEE Computer Security Foundations Workshop (CSFW), page 18, Los Alamitos, CA, USA, 2002. IEEE Computer Society. [ .pdf ]
[23] J. Giles and B. Hajek. An information-theoretic and game-theoretic study of timing channels. IEEE Transactions Information Theory, 48(9):2455-2477, 2002. [ .pdf ]
[24] J. C, Smith. Covert Shells, November 2000. http://www.s0ftpj.org/docs/covert_shells.htm. [ http ]
[25] S. H. Son, R. Mukkamala, R. David. Integrating Security and Real-Time Requirements Using Covert Channel Capacity. IEEE Transactions on Knowledge and Data Engineering, 12(6), November 2000. [ .pdf ]
[26] J. Giles, B. Hajek. The Jamming Game for Packet Timing Channels. In Proceedings of IEEE International Symposium on Information Theory (ISIT), June 2000. [ http ]
[27] J. W. Gray III. Countermeasures and Tradeoffs for a Class of Covert Timing Channels. Technical Report HKUST-CS94-18, Hong Kong University of Science and Technology, 2000. http://repository.ust.hk/dspace/bitstream/1783.1/25/1/tr94-18.pdf. [ .pdf ]
[28] F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn. Information Hiding - A Survey. Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062-1078, July 1999. [ .pdf ]
[29] J. Millen. 20 Years of Covert Channel Modeling and Analysis. In Proceedings of IEEE Symposium on Security and Privacy, pages 113-114, May 1999. [ http ]
[30] S. Shieh. Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems. Journal of Information Science and Engineering, 15:91-106, 1999. [ .pdf ]
[31] Y. Desmedt. Establishing Big Brother using covert channels and other covert techniques. Technical report, Department of Electrical Engineering and Computer Science, 1999. http://www.cs.fsu.edu/~desmedt/IH1/. [ http ]
[32] D. M. Goldschlag. Several secure store and forward devices. In Proceedings of the 3rd ACM conference on Computer and Communications Security (CCS), pages 129-137, March 1996. [ http ]
[33] J. McHugh. Covert Channel Analysis, chapter 8. Naval Research Laboratory, December 1995. [ .pdf ]
[34] R. Browne. An Entropy Conservation Law for Testing the Completness of Covert Channel Analysis. In Computer and Communications Security (CCS), November 1994. [ http ]
[35] J. McDermott. The b2/c3 problem: how big buffers overcome covert channel cynicism in trusted database systems. In Proc. 8th Annual IFIP Conference on Database Security, August 1994. [ .pdf ]
[36] R. Browne. Mode security: an infrastructure for covert channel suppression. In Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, pages 39-55, May 1994. [ http ]
[37] J. T. Trostle. Modelling a Fuzzy Time System (extended Version). Journal of Computer Security, 2(4):291-310, 1994.
[38] I. S. Moskowitz, M. H. Kang. Covert Channels - Here to Stay? In Proceedings of 9th Annual Conference on Computer Assurance, pages 235-244, 1994. [ .ps ]
[39] I. S. Moskowitz, A. R. Miller. Simple Timing Channels. In Proceedings of IEEE Symposium on Research in Security and Privacy, pages 56-64, 1994. [ .pdf ]
[40] V. Gligor. A Guide to Understanding Covert Channel Analysis of Trusted Systems. Technical Report NCSC-TG-030, National Computer Security Center, November 1993. http://www.radium.ncsc.mil/tpep/library/rainbow/NCSC-TG-030.html. [ .html ]
[41] J. T. Trostle. Modelling a Fuzzy Time System. In Proceedings of IEEE Symposium on Security and Privacy, pages 82-89, 1993. [ http ]
[42] M. H. Kang, I. S. Moskowitz. A Pump for Rapid, Reliable, Secure Communication. In Proceedings of ACM Conference on Computer and Communications Security (CCS), pages 119-129, 1993. [ .pdf ]
[43] N. E. Proctor, P. G. Neumann. Architectural Implications of Covert Channels. In Proceedings of the 15th National Computer Security Conference, pages 28-43, October 1992. [ .html ]
[44] I. S. Moskowitz, A. R. Miller. The Channel Capacity of a Certain Noisy Timing Channel. IEEE Transactions on Information Theory, 38(4), 1992. [ .pdf ]
[45] W.-M. Hu. Lattice Scheduling and Covert Channels. In Proceedings of the 1992 IEEE Symposium on Security and Privacy, SP '92, pages 52-. IEEE Computer Society, 1992. [ http ]
[46] R. Kemmerer, P. Porras. Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. IEEE Transactions on Software Engineering, SE-17(11):1166-1185, November 1991. [ http ]
[47] H. Wei-Ming. Reducing Timing Channels with Fuzzy Time. In Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, pages 8-20, May 1991. [ http ]
[48] J. C. Wray. An Analysis of Covert Timing Channels. In Proceedings of IEEE Symposium on Security and Privacy, May 1991. [ http ]
[49] P. A. Porras, R. A. Kemmerer. Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels. In Proceedings of the IEEE Symposium on Security and Privacy, 1991. [ http ]
[50] C. Tsai, V. D. Gligor, C. S. Chandersekaran. On the Identification of Covert Storage Channels in Secure Systems. IEEE Transactions on Software Engineering, 16(6):569-580, June 1990. [ http ]
[51] S. Shieh, V. D. Gligor. Auditing the Use of Covert Storage Channels in Secure Systems. In Proceedings of IEEE Symposium on Security and Privacy, pages 285-295, May 1990. [ http ]
[52] J. T. Wittbold. Controlled Signalling Systems and Covert Channels. In Proceedings of The Computer Security Foundations Workshop II, pages 87-104, June 1989. [ http ]
[53] J. K. Millen. Finite-State Noiseless Covert Channels. In The Second Computer Security Foundations Workshop, pages 81-86, June 1989. [ http ]
[54] J. K. Millen. Foundation of Covert Channel Detection. Technical Report MTR 10538, Mitre Corporation, January 1989.
[55] C. R. Tsai, V. D. Gligor. A Bandwidth Computation Model for Covert Storage Channels and its Applications. In Proceedings of IEEE Symposium on Security and Privacy, pages 108-121, April 1988. [ http ]
[56] C.-R. Tsai, V. D. Gligor. A bandwidth computation model for covert storage channels and its applications. In Proceddings of IEEE Symposium on Security and Privacy, pages 108-121, April 1988. [ http ]
[57] J. K. Millen. Covert Channel Capacity. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 60-66, May 1987. [ http ]
[58] J. T. Haigh, R. Kemmerer, J. McHugh, W. D. Young. An experience using two covert channel analysis techniques on a real system design. IEEE Transactions on Software Engineering, 13(2):157-168, February 1987. [ http ]
[59] J. T. Haigh, R. A. Kemmerer, J. McHugh, W. D. Young. An experience using two covert channel analysis techniques on a real system design. IEEE Trans. Softw. Eng., 13:157-168, February 1987. [ http ]
[60] C. Tsai, V. D. Gligor, C. S. Chandersekaran. A Formal Method for the Identification of Covert Storage Channels in Source Code. In Proceedings of the IEEE Symposium on Security and Privacy, 1987. [ http ]
[61] C. Tsai. Covert Channel Analysis in Secure Computer Systems. PhD thesis, University of Maryland, College Park, 1987.
[62] C. R. Tsai, V. D. Gligor. A Note on Information Flow and Covert Channel Analysis. Technical report, University of Maryland, May 1986.
[63] R. A. Kemmerer. Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels. ACM Transactions on Computer Systems (TOCS), 1(3):256-277, August 1983. [ http ]
[64] R. A. Kemmerer. A Practical Approach to Identifying Storage and Timing Channels. In Proceedings of IEEE Symposium on Security and Privacy, April 1982. [ http ]
[65] J. Millen. Information Flow Analysis of Formal Specifications. In Proceedings of the IEEE Symposium on Security and Privacy, pages 3-8, April 1981. [ http ]
[66] G. R. Andrews, R. P. Reitman. An Axiomatic Approach to Information Flow in Programs. ACM Transaction on Programming Languages and Systems, 2(1):56-76, 1980. [ http ]
[67] J. C. Huskamp. Covert Communication Channels in Timesharing Systems. PhD thesis, University of California, 1978.
[68] D. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5):236-243, May 1976. [ .pdf ]
[69] G. Andrews. Concepts and Conditions for Confinement. Technical Report TR 75-241, Department of Computer Science, Cornell University, May 1975. http://historical.ncstrl.org/tr/temp/ocr/cs-tr.cs.cornell.edu/TR75-241. [ http ]
[70] S. B. Lipner. A Comment on the Confinement Problem. In Proceedings of the fifth ACM Symposium on Operating Systems, 1975. [ http ]
[71] B. Lampson. A Note on the Confinement Problem. Communication of the ACM, 16(10):613-615, October 1973. [ http ]

This file was generated by bibtex2html 1.95.


Last Updated: Tuesday 10-May-2011 17:44:01 AEST | Maintained by: Sebastian Zander (szander@swin.edu.au) | Authorised by: Grenville Armitage ( garmitage@swin.edu.au)