Superimposing permutational covert channels onto reliable stream protocols

Jamie Levy, Jaroslaw Paduch, Bilal Khan. Superimposing permutational covert channels onto reliable stream protocols. In 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008. pages 49-56, IEEE, 2008. [doi]

@inproceedings{LevyPK08,
  title = {Superimposing permutational covert channels onto reliable stream protocols},
  author = {Jamie Levy and Jaroslaw Paduch and Bilal Khan},
  year = {2008},
  doi = {10.1109/MALWARE.2008.4690857},
  url = {http://dx.doi.org/10.1109/MALWARE.2008.4690857},
  researchr = {https://researchr.org/publication/LevyPK08},
  cites = {0},
  citedby = {0},
  pages = {49-56},
  booktitle = {3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008},
  publisher = {IEEE},
  isbn = {978-1-4244-3288-2},
}