Superimposing permutational covert channels onto reliable stream protocols

Jamie Levy, Jaroslaw Paduch, Bilal Khan. Superimposing permutational covert channels onto reliable stream protocols. In 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008. pages 49-56, IEEE, 2008. [doi]

Authors

Jamie Levy

This author has not been identified. Look up 'Jamie Levy' in Google

Jaroslaw Paduch

This author has not been identified. Look up 'Jaroslaw Paduch' in Google

Bilal Khan

This author has not been identified. Look up 'Bilal Khan' in Google