Covert channel-internal control protocols: attacks and defense.
Jaspreet KaurSteffen WendzelOmar EissaJernej TonejcMichael MeierPublished in: Secur. Commun. Networks (2016)
Keyphrases
- covert channel
- security protocols
- security requirements
- cryptographic protocols
- defense mechanisms
- ddos attacks
- security mechanisms
- security flaws
- countermeasures
- authentication protocol
- intrusion detection
- security analysis
- information security
- watermarking scheme
- network security
- smart card
- security policies
- cyber attacks
- access control
- case study