Articles with "covert channels" as a keyword



Photo by usgs from unsplash

Combating Adversarial Covert Channels in Wi-Fi Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3201648

Abstract: Physical layer covert channels exploit the characteristics of radio signals to convey secret messages while remaining inconspicuous within wireless channels. With specifically designed modulation schemes, covert channels effectively disguise secret messages as noise. Since the… read more here.

Keywords: adversarial covert; channels networks; combating adversarial; covert channels ... See more keywords
Photo by hajjidirir from unsplash

Turning Federated Learning Systems Into Covert Channels

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3229124

Abstract: Federated learning (FL) goes beyond traditional, centralized machine learning by distributing model training among a large collection of edge clients. These clients cooperatively train a global, e.g., cloud-hosted, model without disclosing their local, private training… read more here.

Keywords: systems covert; learning systems; federated learning; turning federated ... See more keywords
Photo from wikipedia

Covert Channels in Cyber-Physical Systems

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Control Systems Letters"

DOI: 10.1109/lcsys.2020.3033059

Abstract: In this letter, using a control-theoretic approach, we present a covert channel technique, enabling a compromised networked controller to leak information to an eavesdropper who has access to the measurement channel. We demonstrate that this… read more here.

Keywords: physical systems; channel; control; cyber physical ... See more keywords
Photo from wikipedia

Trends and Challenges in Network Covert Channels Countermeasures

Sign Up to like & get
recommendations!
Published in 2021 at "Applied Sciences"

DOI: 10.3390/app11041641

Abstract: Network covert channels are increasingly used to endow malware with stealthy behaviors, for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner. Unfortunately, the detection of such attacks is… read more here.

Keywords: network covert; trends challenges; challenges network; channels countermeasures ... See more keywords