A survey of timing channels and countermeasures

AK Biswas, D Ghosal, S Nagaraja - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …

Network flow watermarking: A survey

A Iacovazzi, Y Elovici - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic
network administration often takes advantage of TA for purposes such as security, intrusion …

[BUCH][B] Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures

W Mazurczyk, S Wendzel, S Zander, A Houmansadr… - 2016 - books.google.com
Describes Information Hiding in communication networks, and highlights their important
issues, challenges, trends, and applications. Highlights development trends and potential …

Detecting co-residency with active traffic analysis techniques

A Bates, B Mood, J Pletcher, H Pruse… - Proceedings of the …, 2012 - dl.acm.org
Virtualization is the cornerstone of the develo** third party compute industry, allowing
cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical …

EBSNN: Extended byte segment neural network for network traffic classification

X ** third-party compute industry, allowing
cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical …

FPPB: A fast and privacy-preserving method based on the permissioned blockchain for fair transactions in sharing economy

B Li, Y Wang, P Shi, H Chen… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
Blockchain is a distributed system with efficient transaction recording and has been widely
adopted in sharing economy. Although many existing privacy-preserving methods on the …

DropWat: An invisible network flow watermark for data exfiltration traceback

A Iacovazzi, S Sarda, D Frassinelli… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Network flow watermarking techniques have been proposed during the last ten years as an
approach to trace network flows for intrusion detection purposes. These techniques aim to …

Exposing invisible timing-based traffic watermarks with BACKLIT

X Luo, P Zhou, J Zhang, R Perdisci, W Lee… - Proceedings of the 27th …, 2011 - dl.acm.org
Traffic watermarking is an important element in many network security and privacy
applications, such as tracing botnet C&C communications and deanonymizing peer-to-peer …