deneir/pococha/bibliography.bib
2024-02-28 11:25:22 -05:00

82 lines
No EOL
2.6 KiB
BibTeX
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

@article{lampson_covertchannel,
author = {Lampson, Butler W.},
title = {A Note on the Confinement Problem},
year = {1973},
issue_date = {Oct. 1973},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {16},
number = {10},
issn = {0001-0782},
url = {https://doi.org/10.1145/362375.362389},
doi = {10.1145/362375.362389},
journal = {Commun. ACM},
month = {oct},
pages = {613615},
numpages = {3},
keywords = {security, protection, leakage of data, proprietary program, confinement, privacy}
}
@inproceedings{simmons1984prisoners,
title={The prisoners problem and the subliminal channel},
author={Simmons, Gustavus J},
booktitle={Advances in Cryptology: Proceedings of Crypto 83},
pages={51--67},
year={1984},
organization={Springer}
}
@ARTICLE{survey_zander,
author={Zander, Sebastian and Armitage, Grenville and Branch, Philip},
journal={IEEE Communications Surveys & Tutorials},
title={A survey of covert channels and countermeasures in computer network protocols},
year={2007},
volume={9},
number={3},
pages={44-57},
doi={10.1109/COMST.2007.4317620}
}
@article{betz2017survey,
title={Survey on covert channels in virtual machines and cloud computing},
author={Betz, Johann and Westhoff, Dirk and M{\"u}ller, G{\"u}nter},
journal={Transactions on Emerging Telecommunications Technologies},
volume={28},
number={6},
pages={e3134},
year={2017},
publisher={Wiley Online Library}
}
@INPROCEEDINGS{xled,
author={Guri, Mordechai and Zadov, Boris and Daidakulov, Andrey and Elovici, Yuval},
booktitle={2018 16th Annual Conference on Privacy, Security and Trust (PST)},
title={xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs},
year={2018},
volume={},
number={},
pages={1-12},
doi={10.1109/PST.2018.8514196}
}
@INPROCEEDINGS{bitjabber,
author={Zhan, Zihao and Zhang, Zhenkai and Koutsoukos, Xenofon},
booktitle={2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)},
title={BitJabber: The Worlds Fastest Electromagnetic Covert Channel},
year={2020},
volume={},
number={},
pages={35-45},
doi={10.1109/HOST45689.2020.9300268}
}
@ARTICLE{intrumentation_survey,
author={Krishnamurthy, Prashanth and Khorrami, Farshad and Karri, Ramesh and Paul-Pena, David and Salehghaffari, Hossein},
journal={IEEE Transactions on Information Forensics and Security},
title={Process-Aware Covert Channels Using Physical Instrumentation in Cyber-Physical Systems},
year={2018},
volume={13},
number={11},
pages={2761-2771},
doi={10.1109/TIFS.2018.2833063}
}