GIRLING C G.Covert channels in LAN’s[J].IEEE Transactions on Software Engineering,1987,13(2):292-296.
[2]
YAO Li-hong,ZI Xiao-chao,PAN Li,et al.A study of on/off timing channel based on packet delay distribution[J].Computers and Security,2009,28(8):785-794.
[3]
RONALD W S,GEORGE S K.Predictable design of network-based covert communication systems[C]∥Symposium onSecurity and Privacy.Oakland,CA:IEEE,2008:311-321.
[4]
ZOUHEIR T,WASSIME H,SAFUATH.Implementation of an ICMP-based covert channel for file and message transfer[C]∥15th IEEE International Conference on Electronics,Circuits and Systems.Saint-Julien:IEEE,2008:894-897.
[5]
胡文涛,薛质,陈楠.基于网络计数器的隐蔽信道[J].上海交通大学学报,2008,42(10):1678-1681.HU Wen-tao,XUE Zhi,CHEN Nan.Research of covert channels based on Web counters[J].Journal of Shanghai JiaotongUniversity,2008,42(10):1678-1681.(in Chinese)
[6]
SERDAR C,CARLA E B,CLAY S.IP covert timing channels:design and detection[C]∥Proceedings of the 11th ACMConference on Computer and Communications Security.Washington,D.C.:ACM,2004:178-187.
[7]
LUO Xia-pu,EDMOND W W C,ROCKY K C C.TCP covert timing channels:design and detection[C]∥InternationalConference on Dependable Systems&Networks.Anchorage Alaska:IEEE,2008:420-429.
[8]
SEBASTIAN Z,GRENVILLE A,PHILIP B.A survey of covert channels and counter-measures in computer network protocols[J].IEEE Communications Surveys&Tutorials,2007,9(3):44-57.
[9]
CAI Zhi-yong,ZHANG Yong.Integrated covert channel countermeasure model in MLS networks[C]∥InternationalConference on Information Engineering and Computer Science.Wuhan:ICIECS,2009:3755-3758.