Exploiting Temporal Variability in TCP Timestamps for Covert Channel Design
Information is a valuable asset for individuals, organizations, and governments, making secure transmission a critical concern. Cryptographic techniques are widely used to protect communication; however, in scenarios where the mere detection of communication poses a risk, encryption alone is insuffi...
Saved in:
Main Authors: | Silvio R. A. O. Filho, Claudio A. S. Lelis, Eric T. E. Soares, Cesar A. C. Marcondes |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2025-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/11062641/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Whispers in End Hopping: High-Robustness Network Covert Channel Based on End Spreading
by: Zhengwen Wang, et al.
Published: (2025-07-01) -
An Improved Approach to DNS Covert Channel Detection Based on DBM-ENSec
by: Xinyu Li, et al.
Published: (2025-07-01) -
Covert Communications via Full-Duplex User Relaying
by: Jong Yeol Ryu, et al.
Published: (2025-06-01) -
Relay Selection for Covert Communication with an Active Warden
by: Jong Yeol Ryu, et al.
Published: (2025-06-01) -
TCP/IP network administration /
by: Hunt, Craig
Published: (2002)