[1]
|
M. Salaün.
Practical Overview of a Xen Covert Channel.
J. Comput. Virol., 6:317-328, November 2010.
[ .pdf ]
|
[2]
|
C. Soghoian, S. Stamm.
Certified Lies: Detecting and Defeating Government Interception
Attacks Against SSL.
April 2010.
[ .pdf ]
|
[3]
|
D. V. Bailey, D. Boneh, E.-J. Goh, A. Juels.
Covert Channels in Privacy-preserving Identification Systems.
In Proceedings of the 14th ACM conference on Computer and
communications security, CCS '07, pages 297-306. ACM, 2007.
[ http ]
|
[4]
|
T. Jaeger, R. Sailer, Y. Sreenivasan.
Managing the Risk of Covert Information Flows in Virtual Machine
Systems.
In Proceedings of the 12th ACM symposium on Access control
models and technologies, SACMAT '07, pages 81-90. ACM, 2007.
[ .pdf ]
|
[5]
|
Z. Wang, R. Lee.
How Security Models and Processor Architecture Affect Covert
Channels.
In Proceedings of the 22nd Annual Computer Security Applications
Conference (ACSAC), pages 473-482, December 2006.
[ .pdf ]
|
[6]
|
N. Nagatou, T. Watanabe.
Run-Time Detection of Covert Channels.
In Proceedings of First International Conference on
Availability, Reliability and Security (ARES), pages 577-584, April 2006.
[ http ]
|
[7]
|
A. Pfitzmann, M. Hansen.
Anonymity, Unlinkability, Unobservability, Pseudonimity, and
Identity Management - A Consolidated Proposal for Terminology.
Technical report, TU Dresden, Germany, February 2006.
http://dud.inf.tu-dresden.de/Anon_Terminology.shtml.
[ http ]
|
[8]
|
J. C. Hernandez-Castro, I. Blasco-Lopez, J. M. Estevez-Tapiador, A.
Ribagorda-Garnacho.
Steganography in Games: A General Methodology and its Application to
the Game of Go.
Computers & Security, 25(1):64-71, February 2006.
[ http ]
|
[9]
|
Wikipedia.
Covert Channel Wikipedia Definition, 2006.
http://en.wikipedia.org/wiki/Covert_channel.
[ http ]
|
[10]
|
R. Bidou, F. Raynal.
Covert Channels, November 2005.
http://www.iv2-technologies.com/~rbidou/CovertChannels.pdf.
[ .pdf ]
|
[11]
|
Z. Wang, R. Lee.
New Constructive Approach to Covert Channel Modeling and Channel
Capacity Estimation.
In Proceedings of the 8th Information Security Conference (ISC
'05), pages 498-505, September 2005.
[ .pdf ]
|
[12]
|
W. Oblitey, J. L. Wolfe, S. Ezekiel.
Covert Channels: The State of the Practice, August 2005.
http://www.cosc.iup.edu/sezekiel/Publications/CovertChannels-Intro.doc.
[ http ]
|
[13]
|
A. B. Wagner, V. Anantharam.
Information theory of covert timing channels.
In Proceedings of the 2005 NATO/ASI Workshop on Network Security
and Intrusion Detection, 2005.
[ .pdf ]
|
[14]
|
Z. Wang, R. B. Lee.
Capacity Estimation of Non-Synchronous Covert Channels.
In Proceedings of the Second International Workshop on Security
in Distributed Computing Systems (SDCS), pages 170-176, 2005.
[ .pdf ]
|
[15]
|
R. Lanotte, A. Maggiolo-Schettini, S. Tini, A. Troina, E. Tronci.
Automatic Covert Channel Analysis of a Multilevel Secure Component.
In Proceedings of 6th International Conference on Information
and Communications Security (ICICS), pages 249-261, October 2004.
[ .pdf ]
|
[16]
|
S. J. Murdoch, P. Zielinski.
Covert Channels for Collusion in Online Computer Games.
In Proceedings of 6th Information Hiding Workshop. Springer,
May 2004.
[ .pdf ]
|
[17]
|
Information Assurance (IA) Implementation.
Instruction 8500.2, U.S. Department of Defense, Feb. 2003.
[ .pdf ]
|
[18]
|
R. Anderson, M. Bond.
Protocol analysis, composability and computation.
Technical report, University of Cambridge, England, Feb. 2003.
[ .pdf ]
|
[19]
|
R. A. Kemmerer.
A Practical Approach to Identifying Storage and Timing Channels:
Twenty Years Later.
In Proceedings of Annual Computer Security Applications
Conference (ACSAC), pages 109-118, December 2002.
[ http ]
|
[20]
|
L. Bowyer.
Steganographied file transfer using posix file locks, September
2002.
http://www.networkpenetration.com/adv_steg_posix_flock.html.
[ .html ]
|
[21]
|
M. Owens.
A Discussion of Covert Channels and Steganography.
Technical report, SANS Technology Institute, March 2002.
http://www.sans.org/rr/papers/download.php?id=678&c=90f3e1e60e2f74555da474d46c027579.
[ http ]
|
[22]
|
Gavin Lowe.
Quantifying Information Flow.
In 15th IEEE Computer Security Foundations Workshop (CSFW),
page 18, Los Alamitos, CA, USA, 2002. IEEE Computer Society.
[ .pdf ]
|
[23]
|
J. Giles and B. Hajek.
An information-theoretic and game-theoretic study of timing
channels.
IEEE Transactions Information Theory, 48(9):2455-2477, 2002.
[ .pdf ]
|
[24]
|
J. C, Smith.
Covert Shells, November 2000.
http://www.s0ftpj.org/docs/covert_shells.htm.
[ http ]
|
[25]
|
S. H. Son, R. Mukkamala, R. David.
Integrating Security and Real-Time Requirements Using Covert Channel
Capacity.
IEEE Transactions on Knowledge and Data Engineering, 12(6),
November 2000.
[ .pdf ]
|
[26]
|
J. Giles, B. Hajek.
The Jamming Game for Packet Timing Channels.
In Proceedings of IEEE International Symposium on Information
Theory (ISIT), June 2000.
[ http ]
|
[27]
|
J. W. Gray III.
Countermeasures and Tradeoffs for a Class of Covert Timing
Channels.
Technical Report HKUST-CS94-18, Hong Kong University of Science and
Technology, 2000.
http://repository.ust.hk/dspace/bitstream/1783.1/25/1/tr94-18.pdf.
[ .pdf ]
|
[28]
|
F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn.
Information Hiding - A Survey.
Proceedings of the IEEE, special issue on protection of
multimedia content, 87(7):1062-1078, July 1999.
[ .pdf ]
|
[29]
|
J. Millen.
20 Years of Covert Channel Modeling and Analysis.
In Proceedings of IEEE Symposium on Security and Privacy, pages
113-114, May 1999.
[ http ]
|
[30]
|
S. Shieh.
Estimating and Measuring Covert Channel Bandwidth in Multilevel
Secure Operating Systems.
Journal of Information Science and Engineering, 15:91-106,
1999.
[ .pdf ]
|
[31]
|
Y. Desmedt.
Establishing Big Brother using covert channels and other covert
techniques.
Technical report, Department of Electrical Engineering and Computer
Science, 1999.
http://www.cs.fsu.edu/~desmedt/IH1/.
[ http ]
|
[32]
|
D. M. Goldschlag.
Several secure store and forward devices.
In Proceedings of the 3rd ACM conference on Computer and
Communications Security (CCS), pages 129-137, March 1996.
[ http ]
|
[33]
|
J. McHugh.
Covert Channel Analysis, chapter 8.
Naval Research Laboratory, December 1995.
[ .pdf ]
|
[34]
|
R. Browne.
An Entropy Conservation Law for Testing the Completness of Covert
Channel Analysis.
In Computer and Communications Security (CCS), November 1994.
[ http ]
|
[35]
|
J. McDermott.
The b2/c3 problem: how big buffers overcome covert channel cynicism
in trusted database systems.
In Proc. 8th Annual IFIP Conference on Database Security,
August 1994.
[ .pdf ]
|
[36]
|
R. Browne.
Mode security: an infrastructure for covert channel suppression.
In Proceedings of IEEE Computer Society Symposium on Research in
Security and Privacy, pages 39-55, May 1994.
[ http ]
|
[37]
|
J. T. Trostle.
Modelling a Fuzzy Time System (extended Version).
Journal of Computer Security, 2(4):291-310, 1994.
|
[38]
|
I. S. Moskowitz, M. H. Kang.
Covert Channels - Here to Stay?
In Proceedings of 9th Annual Conference on Computer Assurance,
pages 235-244, 1994.
[ .ps ]
|
[39]
|
I. S. Moskowitz, A. R. Miller.
Simple Timing Channels.
In Proceedings of IEEE Symposium on Research in Security and
Privacy, pages 56-64, 1994.
[ .pdf ]
|
[40]
|
V. Gligor.
A Guide to Understanding Covert Channel Analysis of Trusted
Systems.
Technical Report NCSC-TG-030, National Computer Security Center,
November 1993.
http://www.radium.ncsc.mil/tpep/library/rainbow/NCSC-TG-030.html.
[ .html ]
|
[41]
|
J. T. Trostle.
Modelling a Fuzzy Time System.
In Proceedings of IEEE Symposium on Security and Privacy, pages
82-89, 1993.
[ http ]
|
[42]
|
M. H. Kang, I. S. Moskowitz.
A Pump for Rapid, Reliable, Secure Communication.
In Proceedings of ACM Conference on Computer and Communications
Security (CCS), pages 119-129, 1993.
[ .pdf ]
|
[43]
|
N. E. Proctor, P. G. Neumann.
Architectural Implications of Covert Channels.
In Proceedings of the 15th National Computer Security
Conference, pages 28-43, October 1992.
[ .html ]
|
[44]
|
I. S. Moskowitz, A. R. Miller.
The Channel Capacity of a Certain Noisy Timing Channel.
IEEE Transactions on Information Theory, 38(4), 1992.
[ .pdf ]
|
[45]
|
W.-M. Hu.
Lattice Scheduling and Covert Channels.
In Proceedings of the 1992 IEEE Symposium on Security and
Privacy, SP '92, pages 52-. IEEE Computer Society, 1992.
[ http ]
|
[46]
|
R. Kemmerer, P. Porras.
Covert Flow Trees: A Visual Approach to Analyzing Covert Storage
Channels.
IEEE Transactions on Software Engineering,
SE-17(11):1166-1185, November 1991.
[ http ]
|
[47]
|
H. Wei-Ming.
Reducing Timing Channels with Fuzzy Time.
In Proceedings of IEEE Computer Society Symposium on Research in
Security and Privacy, pages 8-20, May 1991.
[ http ]
|
[48]
|
J. C. Wray.
An Analysis of Covert Timing Channels.
In Proceedings of IEEE Symposium on Security and Privacy, May
1991.
[ http ]
|
[49]
|
P. A. Porras, R. A. Kemmerer.
Covert Flow Trees: A Technique for Identifying and Analyzing Covert
Storage Channels.
In Proceedings of the IEEE Symposium on Security and Privacy,
1991.
[ http ]
|
[50]
|
C. Tsai, V. D. Gligor, C. S. Chandersekaran.
On the Identification of Covert Storage Channels in Secure Systems.
IEEE Transactions on Software Engineering, 16(6):569-580, June
1990.
[ http ]
|
[51]
|
S. Shieh, V. D. Gligor.
Auditing the Use of Covert Storage Channels in Secure Systems.
In Proceedings of IEEE Symposium on Security and Privacy, pages
285-295, May 1990.
[ http ]
|
[52]
|
J. T. Wittbold.
Controlled Signalling Systems and Covert Channels.
In Proceedings of The Computer Security Foundations Workshop
II, pages 87-104, June 1989.
[ http ]
|
[53]
|
J. K. Millen.
Finite-State Noiseless Covert Channels.
In The Second Computer Security Foundations Workshop, pages
81-86, June 1989.
[ http ]
|
[54]
|
J. K. Millen.
Foundation of Covert Channel Detection.
Technical Report MTR 10538, Mitre Corporation, January 1989.
|
[55]
|
C. R. Tsai, V. D. Gligor.
A Bandwidth Computation Model for Covert Storage Channels and its
Applications.
In Proceedings of IEEE Symposium on Security and Privacy, pages
108-121, April 1988.
[ http ]
|
[56]
|
C.-R. Tsai, V. D. Gligor.
A bandwidth computation model for covert storage channels and its
applications.
In Proceddings of IEEE Symposium on Security and Privacy, pages
108-121, April 1988.
[ http ]
|
[57]
|
J. K. Millen.
Covert Channel Capacity.
In Proceedings of the IEEE Symposium on Research in Security and
Privacy, pages 60-66, May 1987.
[ http ]
|
[58]
|
J. T. Haigh, R. Kemmerer, J. McHugh, W. D. Young.
An experience using two covert channel analysis techniques on a real
system design.
IEEE Transactions on Software Engineering, 13(2):157-168,
February 1987.
[ http ]
|
[59]
|
J. T. Haigh, R. A. Kemmerer, J. McHugh, W. D. Young.
An experience using two covert channel analysis techniques on a real
system design.
IEEE Trans. Softw. Eng., 13:157-168, February 1987.
[ http ]
|
[60]
|
C. Tsai, V. D. Gligor, C. S. Chandersekaran.
A Formal Method for the Identification of Covert Storage Channels in
Source Code.
In Proceedings of the IEEE Symposium on Security and Privacy,
1987.
[ http ]
|
[61]
|
C. Tsai.
Covert Channel Analysis in Secure Computer Systems.
PhD thesis, University of Maryland, College Park, 1987.
|
[62]
|
C. R. Tsai, V. D. Gligor.
A Note on Information Flow and Covert Channel Analysis.
Technical report, University of Maryland, May 1986.
|
[63]
|
R. A. Kemmerer.
Shared Resource Matrix Methodology: An Approach to Identifying
Storage and Timing Channels.
ACM Transactions on Computer Systems (TOCS), 1(3):256-277,
August 1983.
[ http ]
|
[64]
|
R. A. Kemmerer.
A Practical Approach to Identifying Storage and Timing Channels.
In Proceedings of IEEE Symposium on Security and Privacy, April
1982.
[ http ]
|
[65]
|
J. Millen.
Information Flow Analysis of Formal Specifications.
In Proceedings of the IEEE Symposium on Security and Privacy,
pages 3-8, April 1981.
[ http ]
|
[66]
|
G. R. Andrews, R. P. Reitman.
An Axiomatic Approach to Information Flow in Programs.
ACM Transaction on Programming Languages and Systems,
2(1):56-76, 1980.
[ http ]
|
[67]
|
J. C. Huskamp.
Covert Communication Channels in Timesharing Systems.
PhD thesis, University of California, 1978.
|
[68]
|
D. Denning.
A Lattice Model of Secure Information Flow.
Communications of the ACM, 19(5):236-243, May 1976.
[ .pdf ]
|
[69]
|
G. Andrews.
Concepts and Conditions for Confinement.
Technical Report TR 75-241, Department of Computer Science, Cornell
University, May 1975.
http://historical.ncstrl.org/tr/temp/ocr/cs-tr.cs.cornell.edu/TR75-241.
[ http ]
|
[70]
|
S. B. Lipner.
A Comment on the Confinement Problem.
In Proceedings of the fifth ACM Symposium on Operating Systems,
1975.
[ http ]
|
[71]
|
B. Lampson.
A Note on the Confinement Problem.
Communication of the ACM, 16(10):613-615, October 1973.
[ http ]
|