[1] |
COPPERSMITH D. The Data Encryption Standard(DES) and Its Strength Against Attacks[J]. IBM Journal of Research and Development, 1994,38(3):243-250.
|
[2] |
WANG Yongji, WU Jingzheng, ZENG Haitao, et al. Covert Channel Research[J]. Journal of Software, 2010,21(9):2262-2288.
|
|
王永吉, 吴敬征, 曾海涛, 等. 隐蔽信道研究[J]. 软件学报, 2010,21(9):2262-2288.
|
[3] |
GIRLING C G. Covert Channels in LAN’s[J]. IEEE Transactions on Software Engineering, 1987,13(2):292-296.
|
[4] |
LOW S H, MAXEMCHUK N F, BRASSIL J T, et al. Document Marking and Identification Using Both Line and Word Shifting [C]//IEEE. 4th Annual Joint Conference of the IEEE Computer and Communication Societies, April 2-6, Boston, MA, USA. New Jersey: IEEE, 1995: 853-860.
|
[5] |
BROWN E, YUAN B, JOHNSON D, et al. Covert Channels in the HTTP Network Protocol: Channel Characterization and Detecting Man-in-the-Middle Attacks[J]. Journal of Information Warfare, 2010,9(3):26-38.
|
[6] |
LUO Xiapu, CHAN E W W, ZHOU Peng, et al. Robust Network Covert Communications Based on TCP and Enumerative Combinatorics[J]. IEEE Transactions on Dependable and Secure Computing, 2012,9(6):890-902.
|
[7] |
WANG Fei, HUANG Liusheng, MIAO Haibo, et al. A Novel Distributed Covert Channel in HTTP[J]. Security & Communication Networks, 2014,7(6):1031-1041.
|
[8] |
CABUK S, BRODLEY C E, SHIELDS C. IP Covert Timing Channels: Design and Detection [C]//ACM. 11th ACM Conference on Computer and Communications Security, October 18-20, 2004, Washington DC, USA. New York: ACM, 2004: 178-187.
|
[9] |
SHAH G, MOLINA A, BLAZE M. Keyboards and Covert Channels[EB/OL]. https://www.mendeley.com/catalogue/89442cba-faaa-3d0a-a936-2a0b989a8bb1, 2019 -5-11.
|
[10] |
QIAN Yuwen, ZHAO Bangxin, KONG Jianshou, et al. Robust Covert Timing Channel Based on Web[J]. Journal of Computer Research and Development, 2011,48(3):423-431.
|
|
钱玉文, 赵邦信, 孔建寿, 等. 一种基于Web的可靠网络隐蔽时间信道的研究[J]. 计算机研究与发展, 2011,48(3):423-431.
|
[11] |
KWECKA Z. Application Layer Covert Channel Analysis and Detection[D]. Edinburgh: Napier University, 2006.
|
[12] |
DUSI M, CROTTI M, GRINGOLI F, et al. Tunnel Hunter: Detecting Application-layer Tunnels with Statistical Fingerprinting[J]. Computer Networks, 2009,53(1):81-97.
|
[13] |
GUO Chuanchuan. Research and Implementation on the System of Storage Network Covert Channels Detection[D]. Chengdu: University of Electronic Science and Technology of China, 2016.
|
|
郭川川. 存储式网络隐蔽信道检测研究与实现[D]. 成都:电子科技大学, 2016.
|
[14] |
LIU Yayi, GHOSAL D, ARMKNECHT F, et al. Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic [C]//ACM. 12th International Conference on Information Hiding, June 28-30, 2010, Calgary, AB, Canada. New York: ACM, 2010: 193-207.
|