Author:
Shen Yao,Yang Wei,Huang Liusheng
Funder
National Natural Science Foundation of China
Natural Science Foundation of Jiangsu Province of China
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference45 articles.
1. Aipisteg: An active ip identification based steganographic method;Abdullaziz;J. Netw. Comput. Appl.,2016
2. Ahsan, K., 2002. Covert channel analysis and data hiding in tcp/ip, Ph.D. Thesis, University of Toronto.
3. Bauer, M., 2003. New covert channels in http: adding unwitting web browsers to anonymity sets. In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, ACM, pp. 72–78.
4. Betz, J., Westhoff, D., Mller, G., 2016. Survey on covert channels in virtual machines and cloud computing, Transactions on Emerging Telecommunications Technologies.
5. A framework for avoiding steganography usage over http;Blasco;J. Netw. Comput. Appl.,2012
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Investigating HTTP Covert Channels Through Fuzz Testing;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. Design and Implementation of a Covert Channel Based on Http Headers;2024
3. Covert timing channels: analyzing WEB traffic;Journal of Computer Virology and Hacking Techniques;2021-08-21
4. Entropy-based analyzing anomaly WEB traffic;Journal of High Speed Networks;2020-12-23
5. Towards the Design of a Covert Channel by Using Web Tracking Technologies;Communications in Computer and Information Science;2019