2008 14th IEEE Pacific Rim International Symposium on Dependable Computing 2008
DOI: 10.1109/prdc.2008.26
|View full text |Cite
|
Sign up to set email alerts
|

Towards Adaptive Covert Communication System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(20 citation statements)
references
References 8 publications
0
19
0
Order By: Relevance
“…Covert channels can utilize multiple hiding techniques simultaneously [Wendzel and Keller 2011;Yarochkin et al 2008]. For instance, one technique could modify the LSB of the IPv4 TTL while another technique modifies the IPv4 reserved flag.…”
Section: Similar Approaches To Pattern Variationmentioning
confidence: 99%
See 2 more Smart Citations
“…Covert channels can utilize multiple hiding techniques simultaneously [Wendzel and Keller 2011;Yarochkin et al 2008]. For instance, one technique could modify the LSB of the IPv4 TTL while another technique modifies the IPv4 reserved flag.…”
Section: Similar Approaches To Pattern Variationmentioning
confidence: 99%
“…Moreover, the selection of patterns can be done with adaptive techniques [Yarochkin et al 2008]. Adaptive covert channels dynamically customize the use of covert channel techniques in order to bypass blocked communications [Yarochkin et al 2008] and thus provide a more reliable data transfer.…”
Section: Similar Approaches To Pattern Variationmentioning
confidence: 99%
See 1 more Smart Citation
“…presented a simple technique for the determination of available protocols between covert channel hosts in [9], but did not focus on optimization, forwarding, protocol classification or covert channel versioning, as we do. An important point mentioned by Yarochkin et.…”
Section: Implementations Based On Micro Protocolsmentioning
confidence: 99%
“…Yet, they lack autoconfiguration and dynamic extensibility. The idea of interoperability between covert channel hosts using different network protocols was discussed in [9], where a two-phase protocol was presented which contained a so called "network environment learning phase" (NEL, where the protocols used between two covert hosts where determined), as well as a "communication phase". This paper describes a solution for the missing aspects of such covert network channels and improves on the related work: We discuss the handling of micro protocol implementations in mobile covert channels.…”
Section: Introductionmentioning
confidence: 99%