A survey of timing channels and countermeasures
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …
Network flow watermarking: A survey
A Iacovazzi, Y Elovici - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic
network administration often takes advantage of TA for purposes such as security, intrusion …
network administration often takes advantage of TA for purposes such as security, intrusion …
[BUCH][B] Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures
Describes Information Hiding in communication networks, and highlights their important
issues, challenges, trends, and applications. Highlights development trends and potential …
issues, challenges, trends, and applications. Highlights development trends and potential …
Detecting co-residency with active traffic analysis techniques
A Bates, B Mood, J Pletcher, H Pruse… - Proceedings of the …, 2012 - dl.acm.org
Virtualization is the cornerstone of the develo** third party compute industry, allowing
cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical …
cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical …
EBSNN: Extended byte segment neural network for network traffic classification
X ** third-party compute industry, allowing
cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical …
cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical …
FPPB: A fast and privacy-preserving method based on the permissioned blockchain for fair transactions in sharing economy
B Li, Y Wang, P Shi, H Chen… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
Blockchain is a distributed system with efficient transaction recording and has been widely
adopted in sharing economy. Although many existing privacy-preserving methods on the …
adopted in sharing economy. Although many existing privacy-preserving methods on the …
DropWat: An invisible network flow watermark for data exfiltration traceback
A Iacovazzi, S Sarda, D Frassinelli… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Network flow watermarking techniques have been proposed during the last ten years as an
approach to trace network flows for intrusion detection purposes. These techniques aim to …
approach to trace network flows for intrusion detection purposes. These techniques aim to …
Exposing invisible timing-based traffic watermarks with BACKLIT
Traffic watermarking is an important element in many network security and privacy
applications, such as tracing botnet C&C communications and deanonymizing peer-to-peer …
applications, such as tracing botnet C&C communications and deanonymizing peer-to-peer …