Superimposing permutational covert channels onto reliable stream protocols

Jamie Levy, Jaroslaw Paduch, Bilal Khan. Superimposing permutational covert channels onto reliable stream protocols. In 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008. pages 49-56, IEEE, 2008. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.