A Discussion of Covert Channels and Steganography

  title={A Discussion of Covert Channels and Steganography},
  author={Mark Owens March and GIAC GSEC},
  • Mark Owens March, GIAC GSEC
  • Published 2002
For those whose task it is to assure security, electronic communication without scrutiny that can continue between parties trying to circumvent a security policy poses a risk. This is true whether the “parties” are individuals with malicious intent or processes with different security levels passing data while running on a shared CPU. Covert communication channels have been present throughout history and continue to be developed, used and sometimes exploited by those intent on keeping their… CONTINUE READING
Highly Cited
This paper has 70 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 52 extracted citations

71 Citations

Citations per Year
Semantic Scholar estimates that this publication has 71 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 10 references

Scanning USENET for Steganography

Provos, Neils, Peter Honeyman
University Of Michigan • 2001
View 10 Excerpts
Highly Influenced

Bin Laden’s Messages Could Be Hiding In Plain Sight.

Maney, Kevin
USA Today December • 2001

Secrets & Lies

Schneier, Bruce
View 1 Excerpt

Steganography and Watermarking, University of New South Wales, School of Computer Science and Engineering

Hughes, Dave
View 1 Excerpt

Prisoners’ Problem and the Subliminal Channel (The), CRYPTO83 - Advances in Cryptology, August 22-24

Simmons, J Gustavus
View 1 Excerpt

Department of Defense . Trusted Computer System Evaluation “ The Orange Book ”

S. U.

Similar Papers

Loading similar papers…