Cited By
View all- Schmidbauer TKeller JWendzel S(2022)Challenging Channels: Encrypted Covert Channels within Challenge-Response AuthenticationProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544455(1-10)Online publication date: 23-Aug-2022
- Taleby Ahvanooey MZhu MMazurczyk WLi QKilger MChoo KConti M(2022)CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networksJournal of Information Security and Applications10.1016/j.jisa.2022.10336871(103368)Online publication date: Dec-2022
- Schmidbauer TWendzel S(2021)Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert ChannelsProceedings of the 16th International Conference on Availability, Reliability and Security10.1145/3465481.3470085(1-10)Online publication date: 17-Aug-2021