Open Access
Issue
EPJ Web Conf.
Volume 328, 2025
First International Conference on Engineering and Technology for a Sustainable Future (ICETSF-2025)
Article Number 01049
Number of page(s) 9
DOI https://doi.org/10.1051/epjconf/202532801049
Published online 18 June 2025
  1. Y. Heda and R. Shah, "Covert channel design and detection techniques : a survey," in 2015 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), 2015, pp. 1-6, DOI: 10.1109/CONECCT.2015.7383926. [Google Scholar]
  2. D.M. Dakhane and P.R. Deshmukh, "Active warden for TCP sequence number base covert channel," in 2015 International Conference on Pervasive Computing (ICPC), 2015, pp. 1-5, DOI: 10.1109/PERVASIVE.2015.7087183. [Google Scholar]
  3. P.L. Shrestha, M. Hempel, H. Sharif, and H.-H. Chen, "An Event-Based Unified System Model to Characterize and Evaluate Timing Covert Channels," IEEE Syst. J., vol. 10, no. 1 pp. 271-280, 2016, DOI: 10.1109/JSYST.2014.2328665. [CrossRef] [Google Scholar]
  4. K. Lamshöft, J. Hielscher, C. Krätzer, and J. Dittmann, "The Threat of Covert Channels in Network Time Synchronisation Protocols," J. Cyber Secur. Mobil., vol. 11, no. 2 pp. 165-204, 2022, DOI: 10.13052/jcsm2245-1439.1123. [Google Scholar]
  5. L. Caviglione, "Trends and Challenges in Network Covert Channels Countermeasures," Applied Sciences, vol. 11, no. 4. 2021, DOI: 10.3390/app11041641. [CrossRef] [Google Scholar]
  6. S. Bhattacharya and M. Pandey, "Deploying an energy efficient, secure & high-speed sidechain-based TinyML model for soil quality monitoring and management in agriculture," Expert Syst. Appl., vol. 242, no. May 2024, p. 122735, 2024, DOI: 10.1016/j.eswa.2023.122735. [CrossRef] [Google Scholar]
  7. B. Che et al., "Covert Multi-Channel Communication against Interference-Assisted Proactive Detection," IEEE Trans. Veh. Technol., pp. 1-5, 2024, DOI: 10.1109/TVT.2024.3394734. [Google Scholar]
  8. I. Miketic, K. Dhananjay, and E. Salman, "Covert Channel Communication as an Emerging Security Threat in 2.5D/3D Integrated Systems," Sensors, vol. 23, no. 4. 2023, DOI: 10.3390/s23042081. [CrossRef] [PubMed] [Google Scholar]
  9. H. Li and D. Chasaki, "Detecting covert channel attacks on cyber-physical systems," IET Cyber-Physical Syst. Theory Appl., vol. n/a, no. n/a, Sep. 2023, doi: https://doi.org/10.1049/cps2.12078. [Google Scholar]
  10. K. Lamshoft and J. Dittmann, "Covert Channels in Network Time Security," IH-MMSec 2022-Proc. 2022 ACM Work. Inf. Hiding Multimed. Secur., pp. 69-79, 2022, DOI: 10.1145/3531536.3532947. [Google Scholar]
  11. A. Sheikholeslami, M. Ghaderi, and D. Goeckel, "Covert Communications in Multi-Channel Slotted ALOHA Systems," IEEE Trans. Mob. Comput., vol. 21, no. 6, pp. 19581971, 2022, DOI: 10.1109/TMC.2020.3036022. [CrossRef] [Google Scholar]
  12. J. Hielscher, K. Lamshöft, C. Krätzer, and J. Dittmann, "A Systematic Analysis of Covert Channels in the Network Time Protocol," ACM Int. Conf. Proceeding Ser., 2021, DOI: 10.1145/3465481.3470075. [Google Scholar]
  13. X. Chen et al., "Multi-Antenna Covert Communication via Full-Duplex Jamming Against a Warden With Uncertain Locations," IEEE Trans. Wirel. Commun., vol. 20, no. 8 pp. 5467-5480, 2021, DOI: 10.1109/TWC.2021.3068096. [CrossRef] [Google Scholar]
  14. M. Forouzesh, P. Azmi, A. Kuhestani, and P.L. Yeoh, "Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens," IEEE Trans. Commun., vol. 68, no. 6 pp. 3737-3749, 2020, DOI: 10.1109/TCOMM.2020.2978206. [CrossRef] [Google Scholar]
  15. W. Mazurczyk, S. Wendzel, M. Chourib, and J. Keller, "Countering adaptive network covert communication with dynamic wardens," Futur. Gener. Comput. Syst., vol. 94, pp. 712-725, 2019, doi: https://doi.org/10.1016/j.future.2018.12.047. [CrossRef] [Google Scholar]
  16. S.-H. Lee, L. Wang, A. Khisti, and G.W. Wornell, "Covert Communication With Channel-State Information at the Transmitter," IEEE Trans. Inf. Forensics Secur., vol. 13, no. 9 pp. 2310-2319, 2018, DOI: 10.1109/TIFS.2018.2818650. [CrossRef] [Google Scholar]
  17. B.W. Lampson, (1973). A note on the confinement problem," Commun. ACM, 16(10); 613-615. doi: 10.1145/362375.362389 [CrossRef] [Google Scholar]
  18. S.J. Murdoch, (2007). Covert channel vulnerabilities in anonymitysystems Ph.D. dissertation,, University of Cambridge. [Google Scholar]
  19. Sebastian Zander and Grenville Armitage, and Philip Branch, Swinburne University Of Technology Melbourne, Australia "A Survey of Covert channels and countermeasures in computer network protocols", IEEE Communications Surveys & Tutorials 44, 2007. doi : 10.1109/mcom.2007.4395378 [Google Scholar]
  20. Stevan Gianvecchio and Haining Wang. Detecting covert timing channels: An entropy based approach. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07, pages 307-316, http://doi.acm.org/10.1145/1315245.1315284. [Google Scholar]
  21. G.J. Simmons, "The Prisoners' Problem and the Subliminal Channel," Proc. Advances in Cryptology (CRYPTO), 1983, pp. 51-67. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.