A Discussion of Covert Channels and Steganography

@inproceedings{March2002ADO,
  title={A Discussion of Covert Channels and Steganography},
  author={Mark Owens March and GIAC GSEC},
  year={2002}
}
  • Mark Owens March, GIAC GSEC
  • Published 2002
For those whose task it is to assure security, electronic communication without scrutiny that can continue between parties trying to circumvent a security policy poses a risk. This is true whether the “parties” are individuals with malicious intent or processes with different security levels passing data while running on a shared CPU. Covert communication channels have been present throughout history and continue to be developed, used and sometimes exploited by those intent on keeping their… CONTINUE READING
Highly Cited
This paper has 70 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 52 extracted citations

71 Citations

051015'07'10'13'16'19
Citations per Year
Semantic Scholar estimates that this publication has 71 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 10 references

Scanning USENET for Steganography

Provos, Neils, Peter Honeyman
University Of Michigan • 2001
View 10 Excerpts
Highly Influenced

Bin Laden’s Messages Could Be Hiding In Plain Sight.

Maney, Kevin
USA Today December • 2001

Secrets & Lies

Schneier, Bruce
2000
View 1 Excerpt

Steganography and Watermarking, University of New South Wales, School of Computer Science and Engineering

Hughes, Dave
2000
View 1 Excerpt

Prisoners’ Problem and the Subliminal Channel (The), CRYPTO83 - Advances in Cryptology, August 22-24

Simmons, J Gustavus
1984
View 1 Excerpt

Department of Defense . Trusted Computer System Evaluation “ The Orange Book ”

S. U.
-1

Similar Papers

Loading similar papers…