Covert channel

Known as: Covert channels 
In computer security, a covert channel is a type of computer security attack that creates a capability to transfer information objects between… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
A covert channel can occur when an attacker finds and exploits a shared resource that is not designed to be a communication… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Covert channels are mechanisms for communicating information in ways that are difficult to detect. Data exfiltration can be an… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
There have long been threads of investigation into covert channels, and threads of investigation into anonymity, but these two… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Covert channels emerged in mystery and departed in 
Is this relevant?
Highly Cited
1994
Highly Cited
1994
We discuss the di culties of satisfying high-assurance system requirements without sacri cing system capabilities. To alleviate… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 7
Is this relevant?
Highly Cited
1993
Highly Cited
1993
It's coming again, the new collection that this site has. To complete your curiosity, we offer the favorite guide to… (More)
Is this relevant?
Highly Cited
1987
Highly Cited
1987
Techniques for detecting covert channels are based on information flow models. This paper establishes a connection between… (More)
Is this relevant?
Highly Cited
1987
Highly Cited
1987
An information transfer path that allows information to be transferred in a manner that violates the security policy of a trusted… (More)
  • figure 1
  • figure 2
Is this relevant?