Superimposing permutational covert channels onto reliable stream protocols

Jamie Levy, Jaroslaw Paduch, Bilal Khan. Superimposing permutational covert channels onto reliable stream protocols. In 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008. pages 49-56, IEEE, 2008. [doi]

Abstract

Abstract is missing.