All Stories

  1. Analysis of network traffic hiding techniques in modern malware (computer viruses)
  2. Robust and Homomorphic Covert Channels in Streams of Numeric Data
  3. A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning
  4. Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION
  5. Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication
  6. Towards Passive Identification of Aged Android Devices in the Home Network
  7. Steganography Hiding Patterns: A Brief Review
  8. SoK
  9. Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems
  10. How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data
  11. Reset- and Reconnection-based Covert Channels in CoAP
  12. Risks and Opportunities for Information Hiding in DICOM Standard
  13. A Revised Taxonomy of Steganography Embedding Patterns
  14. Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels
  15. Crème de la Crème: Lessons from Papers in Security Publications
  16. Anomaly Detection in ICS based on Data-history Analysis
  17. Covert Channels in One-Time Passwords Based on Hash Chains
  18. Covert storage caches using the NTP protocol
  19. Design and performance evaluation of reversible network covert channels
  20. Not all areas are equal: analysis of citations in information security research
  21. Towards Reversible Storage Network Covert Channels
  22. Protocol-independent Detection of "Messaging Ordering" Network Covert Channels
  23. Countering adaptive network covert communication with dynamic wardens
  24. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach
  25. Get Me Cited, Scotty!
  26. The New Threats of Information Hiding: The Road Ahead
  27. Emerging and Unconventional: New Attacks and Innovative Detection Techniques
  28. Detection of Covert Channels in TCP Retransmissions
  29. Information hiding
  30. Recent Advancements in Digital Forensics
  31. The Future of Digital Forensics: Challenges and the Road Ahead
  32. Cyber Security of Smart Buildings
  33. Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach
  34. Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators
  35. Don’t You Touch My Nuts: Information Hiding in Cyber Physical Systems
  36. Network Information Hiding and Science 2.0: Can it be a Match?
  37. Enhanced Ant Colony-Inspired ParallelAlgorithm to Improve Cryptographic PRNGs
  38. Steganography for Cyber-physicalSystems
  39. POSTER
  40. IoT Security: The Improvement-Decelerating 'Cycle of Blame'
  41. Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions
  42. How to increase the security of smart buildings?
  43. Covert channel-internal control protocols: attacks and defense
  44. Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures
  45. Countermeasures for Covert Channel-Internal Control Protocols
  46. Pattern-Based Survey and Categorization of Network Covert Channel Techniques
  47. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments
  48. Securing BACnet’s Pitfalls
  49. Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making
  50. “The Good, The Bad and The Ugly”: Evaluation of Wi-Fi Steganography
  51. On importance of steganographic cost for network steganography
  52. Hidden and under control
  53. Hidden and Uncontrolled – On the Emergence of Network Steganographic Threats
  54. IT-gestütztes Management und Controlling
  55. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels
  56. Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet
  57. Detecting protocol switching covert channels
  58. Covert and side channels in buildings and the prototype of a building-aware active warden
  59. Einführung
  60. Fortgeschrittene Themen für verdeckte Kanäle
  61. Geheimes Tunneling
  62. Grundlagen verdeckter Kanäle
  63. Prävention und Detektion verdeckter Kanäle
  64. Systematic Engineering of Control Protocols for Covert Channels
  65. TCP/IP-Grundlagen für das Tunneling
  66. Tunnel und verdeckte Kanäle im Netz
  67. Tunneling-Protokolle
  68. A secure interoperable architecture for building-automation applications
  69. Low-Attention Forwarding for Mobile Network Covert Channels