Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,516 papers from all fields of science
Search
Sign In
Create Free Account
Covert channel
Known as:
Covert channels
In computer security, a covert channel is a type of computer security attack that creates a capability to transfer information objects between…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
Attack (computing)
Bell–LaPadula model
Botnet
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Quantifying expert consensus against the existence of a secret, large-scale atmospheric spraying program
C. Shearer
,
M. West
,
K. Caldeira
,
S. Davis
2016
Corpus ID: 157382820
Nearly 17% of people in an international survey said they believed the existence of a secret large-scale atmospheric program…
Expand
Review
2010
Review
2010
Covert Channel Research
Yong-Ji Wang
,
Jingzheng Wu
,
Zeng Hai-Tao
,
Liping Ding
,
Xiaofeng Liao
2010
Corpus ID: 61533449
Covert channel is the communication channel that allows a process to transfer information in a manner that violates the system's…
Expand
2009
2009
A Normal-Traffic Network Covert Channel
Liping Ji
,
Haijin Liang
,
Yitao Song
,
X. Niu
International Conference on Computational…
2009
Corpus ID: 18196227
Covert channels are widely used for secret information transmission on networks. Although existing packet length based covert…
Expand
2007
2007
Covert Identity Information in Direct Anonymous Attestation (DAA)
C. Rudolph
IFIP International Information Security…
2007
Corpus ID: 7417596
Direct anonymous attestation (DAA) is a practical and efficient protocol for authenticated attestation with satisfaction of…
Expand
2007
2007
An Empirical Evaluation of IP Time To Live Covert Channels
S. Zander
,
G. Armitage
,
P. Branch
ICON
2007
Corpus ID: 2918019
Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough…
Expand
2007
2007
A Library for Secure Multi-threaded Information Flow in Haskell
Ta-Chung Tsai
,
Alejandro Russo
,
John Hughes
IEEE Computer Security Foundations Symposium
2007
Corpus ID: 10232976
Li and Zdancewic have recently proposed an approach to provide information-flow security via a library rather than producing a…
Expand
2005
2005
Performance evaluation of secure concurrency control algorithm for multilevel secure distributed database system
Navdeep Kaur
,
Rajwinder Singh
,
A. Sarje
,
M. Misra
International Conference on Information…
2005
Corpus ID: 16225418
Majority of the research in multilevel secure database management systems (MLS/DBMS) focuses primarily on centralized database…
Expand
1996
1996
Covert Channel Elimination Protocols
N. Ogurtsov
,
H. Orman
,
R. Schroeppel
,
S. O'Malley
,
Oliver Spatscheck
1996
Corpus ID: 18813110
With the increasing growth of electronic communications, it is becoming important to provide a mechanism for enforcing various…
Expand
1996
1996
Analog VLSI circuits for covert attentional shifts
T. Morris
,
S. DeWeerth
Proceedings of Fifth International Conference on…
1996
Corpus ID: 60636234
In this paper we present analog very large-scale integrated (aVLSI) circuits that facilitate the selection process for initiating…
Expand
1984
1984
The Deceptive Text: An Introduction to Covert Plots
C. Watts
1984
Corpus ID: 190048828
The book demonstrates that numerous literary texts contain covert plots, plot-sequences so elliptically presented that they may…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE