Computer and Network Security 2020
DOI: 10.5772/intechopen.82580
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communication Using Cryptography and Covert Channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(8 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…However, it incurs additional traffic overhead and is time-consuming. Studies [3], [6] utilize stack-overflow attacks and address space layout randomization on Linux to transmit different file formats. The sender attempts to guess the delta_mmap memory (16 bits) while one entity indirectly sends files to another entity through a server located on the same machine.…”
Section: Related Work a Relevant Studiesmentioning
confidence: 99%
See 2 more Smart Citations
“…However, it incurs additional traffic overhead and is time-consuming. Studies [3], [6] utilize stack-overflow attacks and address space layout randomization on Linux to transmit different file formats. The sender attempts to guess the delta_mmap memory (16 bits) while one entity indirectly sends files to another entity through a server located on the same machine.…”
Section: Related Work a Relevant Studiesmentioning
confidence: 99%
“…In this study, throughput refers to the number of bits sent via the covert channel per second. The time it takes for data to be transmitted through our covert channel is the subject of our paper, referred to as 'time' [3], [6], [13], [14].…”
Section: A Experiments Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, they are more difficult to avoid and detect: identifying the message in a covert channel requires complete understanding of the application. Tamer Fatayer et al [4,9,12], proposed behavior based channel through exploiting memory address in Linux operating system, where this channel change the behavior of using system calls and redirect the system call to malicious code implement by attacker to perform specific tasks.…”
Section: ) Storage Covert Channelsmentioning
confidence: 99%
“…Identification, elimination, and capacity restriction of covert channels must be addressed to protect future computer networks, which is difficult. The current trend of covert channels is used in transforming secret information between entities [4,9,12,17,18,19]. The researchers exploit network to transfer secret data (e.g., text, video, web, and audio) between entities.…”
Section: Covert Channel Senariosmentioning
confidence: 99%