82 lines
No EOL
2.6 KiB
BibTeX
82 lines
No EOL
2.6 KiB
BibTeX
@article{lampson_covertchannel,
|
||
author = {Lampson, Butler W.},
|
||
title = {A Note on the Confinement Problem},
|
||
year = {1973},
|
||
issue_date = {Oct. 1973},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
volume = {16},
|
||
number = {10},
|
||
issn = {0001-0782},
|
||
url = {https://doi.org/10.1145/362375.362389},
|
||
doi = {10.1145/362375.362389},
|
||
journal = {Commun. ACM},
|
||
month = {oct},
|
||
pages = {613–615},
|
||
numpages = {3},
|
||
keywords = {security, protection, leakage of data, proprietary program, confinement, privacy}
|
||
}
|
||
|
||
@inproceedings{simmons1984prisoners,
|
||
title={The prisoners’ problem and the subliminal channel},
|
||
author={Simmons, Gustavus J},
|
||
booktitle={Advances in Cryptology: Proceedings of Crypto 83},
|
||
pages={51--67},
|
||
year={1984},
|
||
organization={Springer}
|
||
}
|
||
|
||
@ARTICLE{survey_zander,
|
||
author={Zander, Sebastian and Armitage, Grenville and Branch, Philip},
|
||
journal={IEEE Communications Surveys & Tutorials},
|
||
title={A survey of covert channels and countermeasures in computer network protocols},
|
||
year={2007},
|
||
volume={9},
|
||
number={3},
|
||
pages={44-57},
|
||
doi={10.1109/COMST.2007.4317620}
|
||
}
|
||
|
||
@article{betz2017survey,
|
||
title={Survey on covert channels in virtual machines and cloud computing},
|
||
author={Betz, Johann and Westhoff, Dirk and M{\"u}ller, G{\"u}nter},
|
||
journal={Transactions on Emerging Telecommunications Technologies},
|
||
volume={28},
|
||
number={6},
|
||
pages={e3134},
|
||
year={2017},
|
||
publisher={Wiley Online Library}
|
||
}
|
||
|
||
@INPROCEEDINGS{xled,
|
||
author={Guri, Mordechai and Zadov, Boris and Daidakulov, Andrey and Elovici, Yuval},
|
||
booktitle={2018 16th Annual Conference on Privacy, Security and Trust (PST)},
|
||
title={xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs},
|
||
year={2018},
|
||
volume={},
|
||
number={},
|
||
pages={1-12},
|
||
doi={10.1109/PST.2018.8514196}
|
||
}
|
||
|
||
@INPROCEEDINGS{bitjabber,
|
||
author={Zhan, Zihao and Zhang, Zhenkai and Koutsoukos, Xenofon},
|
||
booktitle={2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)},
|
||
title={BitJabber: The World’s Fastest Electromagnetic Covert Channel},
|
||
year={2020},
|
||
volume={},
|
||
number={},
|
||
pages={35-45},
|
||
doi={10.1109/HOST45689.2020.9300268}
|
||
}
|
||
|
||
@ARTICLE{intrumentation_survey,
|
||
author={Krishnamurthy, Prashanth and Khorrami, Farshad and Karri, Ramesh and Paul-Pena, David and Salehghaffari, Hossein},
|
||
journal={IEEE Transactions on Information Forensics and Security},
|
||
title={Process-Aware Covert Channels Using Physical Instrumentation in Cyber-Physical Systems},
|
||
year={2018},
|
||
volume={13},
|
||
number={11},
|
||
pages={2761-2771},
|
||
doi={10.1109/TIFS.2018.2833063}
|
||
} |