1. Zander S, Armitage G, Branch P. Covert channels and countermeasures in computer network protocols. IEEE Commun Mag, 2007, 45: 136–142
2. Luo X, Chan E W W, Chang R K C. TCP covert timing channels: Design and detection. In: Proc. of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Anchorage, Alaska, 2008. 420–429
3. Sellke S H, Wang C, Bagchi S, et al. TCP/IP timing channels: Theory to implementation. In: Proc. of 28th IEEE International Conference on Computer Communications, Rio de Janeiro, Brazil, 2009. 2204–2212
4. Bai L Y, Huang Y, Hou G, et al. Covert channels based on Jitter field of the RTCP header. In: Proc. of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008. 1388–1391
5. Huang Y, Xiao B, Xiao H. Implementation of covert communication based on steganography. In: Proc. of 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008. 1512–1515