Sign Up to like & get
recommendations!
1
Published in 2022 at "International Journal of Intelligent Systems"
DOI: 10.1002/int.22868
Abstract: Covert communication in this regard has been widely used for protecting the secrecy of communication. Voice over Long Term Evolution (VoLTE) is a packet‐switched core network solution for high‐speed and high‐quality end‐to‐end services which usually…
read more here.
Keywords:
mobile intelligent;
communication;
covert channel;
packet ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Multimedia Systems"
DOI: 10.1007/s00530-019-00636-6
Abstract: As the VoIP steganographic methods provide a low capacity covert channel for data transmission, an efficient and real-time data transmission protocol over this channel is required which provides reliability with minimum bandwidth usage. This paper…
read more here.
Keywords:
protocol;
micro protocol;
data transmission;
covert channel ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Mobile Networks and Applications"
DOI: 10.1007/s11036-019-01482-6
Abstract: Nowadays, the use of nodes with different sensing capabilities is pervasive. This leads to many environments capable of monitoring human activity for security, comfort, and connectivity applications among others. However, this also leads to many…
read more here.
Keywords:
based system;
system;
covert channel;
radio based ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Telecommunication Systems"
DOI: 10.1007/s11235-018-0429-1
Abstract: Vehicular Ad hoc Network (VANET) enables high speed vehicles to communicate with each other. This kind of communication can provide road safety and passengers’ comfort. Covert channels are used to transmit information secretly over the…
read more here.
Keywords:
storage;
vehicular hoc;
channel;
timing storage ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2022.3189578
Abstract: In response to growing security challenges facing many-core systems imposed by thermal covert channel (TCC) attacks, a number of threshold-based detection methods have been proposed. In this paper, we show that these threshold-based detection methods…
read more here.
Keywords:
thermal covert;
mml mml;
mml;
covert channel ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2022.3222083
Abstract: The frontend of modern Intel processors will decode instructions into $\mu$μops and stream them to the backend by the frontend bus, which is shared between two logical cores to maximize utilization without sharing mechanism fully…
read more here.
Keywords:
frontend bus;
kbps accuracy;
covert channel;
bus ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2020.3017892
Abstract: Previous research works have endorsed the use of delays and clock skews for detecting intrusions or fingerprinting controllers that communicate on the CAN bus. Recently, timing characteristics of CAN frames have been also used for…
read more here.
Keywords:
bus;
authentication;
covert channel;
canto covert ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Very Large Scale Integration (VLSI) Systems"
DOI: 10.1109/tvlsi.2022.3203430
Abstract: Exploiting thermal coupling among the cores of a processor to secretly communicate sensitive information is a serious threat in mobile, desktop, and server platforms. Existing works on temperature-based covert communication typically rely on controlling the…
read more here.
Keywords:
bandwidth thermal;
covert communication;
thermal covert;
covert channel ... See more keywords