Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
covert channels
biblio
Traffic Normalization for Covert Channel Protecting
Submitted by grigby1 on Tue, 04/19/2022 - 3:13pm
information security
tools
timing
telecommunication traffic
security
Scalability
Resiliency
resilience
residual covert channel capacity
pubcrawl
normalization
channel capacity
Information Leakage
estimation
Data protection
covert channels
covert channel
countermeasure
Compositionality
composability
Channel estimation
biblio
LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables Emission
Submitted by grigby1 on Mon, 12/20/2021 - 1:18pm
Human behavior
Virtual machining
Resiliency
resilience
pubcrawl
Portable computers
Metrics
Meters
malware
LAN
Air gaps
exfiltration
Ethernet
electromagnetic
data leakage
covert channels
Computers
composability
Communication cables
air-gap
biblio
On Countermeasures Against the Thermal Covert Channel Attacks Targeting Many-core Systems
Submitted by grigby1 on Wed, 02/10/2021 - 12:52pm
Bit error rate
three-step countermeasure
thermal covert channel attacks
Thermal Covert Channel
TCC attack
signal frequency scanning
manycore systems
Many-core systems
dynamic voltage frequency scaling technique
DVFS technique
Defense against Covert Channel Attack
critical defense issue
Multicore processing
signal detection
security of data
covert channels
error statistics
Temperature sensors
Transmitters
Compositionality
Receivers
multiprocessing systems
thermal noise
Scalability
Resiliency
resilience
pubcrawl
biblio
C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage
Submitted by grigby1 on Wed, 02/10/2021 - 12:52pm
potentially unintentional interactions
FPGA-to-FPGA
FPGAs
GPU-to-FPGA covert channels
hardware accelerators
highly-sensitive data
independent boards
Kintex 7 FPGA chips
local cloud FPGA
off-the-shelf Xilinx boards
per-user basis
potential countermeasures
FPGA security
Power Attacks
power supply unit leakage
Power supply units
receiving circuits
reconfigurable integrated circuits
Ring oscillators
sensing stressing ring oscillators
shared infrastructures
shared power supply units
sink FPGA
source FPGA
covert channels
pubcrawl
resilience
Resiliency
field programmable gate arrays
Hardware
Scalability
cloud environments
Compositionality
Voltage measurement
Transmitters
cryptographic keys
Cryptography
Field-Programmable Gate Arrays
Temperature measurement
Voltage control
Voltage regulators
APSULe
CPU-to-FPGA
cross-board leakage
cross-FPGA covert-channel attacks
data center infrastructure
different data center tenants
biblio
Keyless Covert Communication in the Presence of Channel State Information
Submitted by grigby1 on Wed, 02/10/2021 - 12:52pm
pubcrawl
resilience
Resiliency
telecommunication security
Scalability
Compositionality
wireless channels
transmitter
channel capacity
channel coding
covert channels
covert capacity
channel output
channel state information
innocent channel-input symbol
keyless covert communication
biblio
Covert Communication by Exploiting Node Multiplicity and Channel Variations
Submitted by grigby1 on Wed, 02/10/2021 - 12:51pm
error statistics
wireless broadcast networks
superposition coding
Propagation losses
private message
pre-shared secret
noncovert users
noncovert message
node multiplicity
low probability of detection (LPD)
detection probability
detection error probability
channel variation
covert channels
Information hiding
covert communication
pubcrawl
error probability
covert message
broadcast channels
Transmitters
uncertainty
wireless channels
Compositionality
Receivers
radio networks
Wireless communication
Scalability
telecommunication security
Throughput
Resiliency
resilience
biblio
CloakLoRa: A Covert Channel over LoRa PHY
Submitted by grigby1 on Wed, 02/10/2021 - 12:51pm
lora
software radio
covert communication
amplitude modulated covert channel
amplitude modulation
CloakLoRa
COTS LoRa nodes
covert information
differentiate LoRa symbols
Chirp
LoRa chirps
LoRa PHY
LoRa physical layer
regular LoRa node
regular LoRa packet
spread spectrum communication
unique modulation scheme
Cryptography
Cascading style sheets
Frequency modulation
data encapsulation
covert channels
wireless channels
Compositionality
Receivers
Buildings
Payloads
Scalability
telecommunication security
Resiliency
resilience
pubcrawl
security
biblio
On the Distributed Jamming System of Covert Timing Channels in 5G Networks
Submitted by grigby1 on Wed, 02/10/2021 - 12:51pm
covert channels
modulation method
modulation
jam system
interference algorithm
fifth generation mobile network
diversity reception
diversity networks
distributing jammer
distributed jamming system
co-constructing and sharing
5g network
5G mobile network
radiofrequency interference
Jamming
security
Interference
covert channel
covert timing channel
Transmitters
timing
Compositionality
network security
5G mobile communication
Scalability
telecommunication security
Resiliency
resilience
pubcrawl
Servers
biblio
A Network Covert Timing Channel Detection Method Based on Chaos Theory and Threshold Secret Sharing
Submitted by grigby1 on Wed, 02/10/2021 - 12:50pm
resilience
unique channel traits
traditional security policies
time series
Threshold secret sharing
telecommunication traffic
telecommunication channels
stable channel traits
security of data
security concern
secret reconstruction strategy
Scalability
Robustness
Resiliency
channel identifier
pubcrawl
one-dimensional time series
network traffic
network covert timing channel detection method
network covert timing channel
NCTC detection method
inter-packet delay
high-dimensional phase space
covert channels
Compositionality
chaos theory
chaos
biblio
Covert Channels of Data Communication
Submitted by grigby1 on Wed, 02/10/2021 - 12:50pm
Compositionality
protected operating system
mandatory access control
Linux operating system
Linux kernel
data communication
covert channels
covert storage channels
confidential information
authorisation
Linux
security threats
Access Control
Scalability
Resiliency
resilience
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »