Jamie Levy, Jaroslaw Paduch, Bilal Khan. Superimposing permutational covert channels onto reliable stream protocols. In 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008. pages 49-56, IEEE, 2008. [doi]
@inproceedings{LevyPK08, title = {Superimposing permutational covert channels onto reliable stream protocols}, author = {Jamie Levy and Jaroslaw Paduch and Bilal Khan}, year = {2008}, doi = {10.1109/MALWARE.2008.4690857}, url = {http://dx.doi.org/10.1109/MALWARE.2008.4690857}, researchr = {https://researchr.org/publication/LevyPK08}, cites = {0}, citedby = {0}, pages = {49-56}, booktitle = {3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008}, publisher = {IEEE}, isbn = {978-1-4244-3288-2}, }