{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:14:03Z","timestamp":1775913243231,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540347453","type":"print"},{"value":"9783540347460","type":"electronic"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11767831_10","type":"book-chapter","created":{"date-parts":[[2006,6,21]],"date-time":"2006-06-21T12:03:07Z","timestamp":1150891387000},"page":"147-166","source":"Crossref","is-referenced-by-count":63,"title":["Covert Channels in IPv6"],"prefix":"10.1007","author":[{"given":"Norka B.","family":"Lucena","sequence":"first","affiliation":[]},{"given":"Grzegorz","family":"Lewandowski","sequence":"additional","affiliation":[]},{"given":"Steve J.","family":"Chapin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Gligor, V.D.: A Guide to Understanding Covert Channel Analysis of Trusted Systems. National Computer Security Center, Meade, MD, USA. Version-1 edn. (1993) NCSC-TG-030"},{"key":"10_CR2","unstructured":"McHugh, J.: Covert Channel Analysis: A Chapter of the Handbook for the Computer Security Certification of Trusted Systems. Portland State University, Portland, Oregon, USA (1995)"},{"key":"10_CR3","unstructured":"of\u00a0Defense, U.D.: Department of Defense Trusted Computer System Evaluation Criteria (1985) DOD 5200.28-STD"},{"key":"10_CR4","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1145\/1030083.1030108","volume-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security","author":"S. Cabuk","year":"2004","unstructured":"Cabuk, S., Brodley, C.E., Shields, C.: Ip covert timing channels: Design and detection. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington DC, USA, pp. 178\u2013187. ACM Press, New York (2004)"},{"key":"10_CR5","unstructured":"Ahsan, K.: Covert channel analysis and data hiding in tcp\/ip. Master\u2019s thesis, University of Toronto (2002)"},{"key":"10_CR6","unstructured":"Ahsan, K., Kundur, D.: Practical data hiding in tcp\/ip. In: Proceedings of the ACM Workshop on Multimedia Security at ACM Multimedia (2002)"},{"key":"10_CR7","unstructured":"Servetto, S.D., Vetterli, M.: Codes for the fold-sum channel. In: Proceedings of the 35th Annual Conference on Information Science and Systems (CISS), Baltimore, MD, USA (2001)"},{"key":"10_CR8","unstructured":"Servetto, S.D., Vetterli, M.: Communication using phantoms: Covert channels in the internet. In: Proceedings of the IEEE International Symposium on Information Theory (ISIT), Washington, DC, USA (2001)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/3-540-61996-8_29","volume-title":"Information Hiding","author":"T. Handel","year":"1996","unstructured":"Handel, T., Sandford, M.: Hiding data in the OSI network model. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 23\u201338. Springer, Heidelberg (1996)"},{"key":"10_CR10","unstructured":"Szczypiorski, K.: Hiccups: Hidden communication system for coruppted networks. In: Proceedings of the Tenth International Multi-Conference on Advanced Computer Systems ACS 2003, Mi\u0119dzyzdroje, Poland, pp. 31\u201340 (2003)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Rowland, C.H.: Covert channels in the TCP\/IP protocol suite. Psionics Technologies (1996), http:\/\/www.firstmonday.dk\/issues\/issue2_5\/rowland\/","DOI":"10.5210\/fm.v2i5.528"},{"key":"10_CR12","unstructured":"Dunigan, T.: Internet steganography. Technical report, Oak Ridge National Laboratory (Contract No. DE-AC05-96OR22464), Oak Ridge, Tennessee (1998) [ORNL\/TM-limited distribution]"},{"key":"10_CR13","unstructured":"Rutkowska, J.: The implementation of passive covert channels in the linux kernel. In: 21st Chaos Communication Congress, Berliner Congress Center, Berlin, Germany (2004), www.ccc.de\/congress\/2004\/fahrplan\/files\/223-passive-covert-channels-linux.pdf"},{"key":"10_CR14","unstructured":"Abad, C.: Ip checksum covert channels and selected hash collision (2001), http:\/\/gray-world.net\/cn\/papers\/ipccc.pdf"},{"key":"10_CR15","unstructured":"Wang, X., Feng, D., Lai, X., Yu, H.: Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMID (2004), http:\/\/eprint.iacr.org\/2004\/199\/"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Kaminsky, D.: MD5 to be considered harmful someday (2004), http:\/\/www.doxpara.com\/md5_someday.pdf","DOI":"10.1016\/B978-193183620-3\/50016-6"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/3-540-36467-6_15","volume-title":"Privacy Enhancing Technologies","author":"J. Giffin","year":"2003","unstructured":"Giffin, J., Greenstadt, R., Litwack, P., Tibbetts, R.: Covert messaging through TCP timestamps. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 194\u2013208. Springer, Heidelberg (2003)"},{"key":"10_CR18","unstructured":"daemon9 (route@infonexus.com): Loki2 (the implementation). Phrack Magazine, 51, article 6 (1997), http:\/\/www.phrack.org\/show.php?p=51&a=6"},{"key":"10_CR19","unstructured":"daemon9 (route@infonexus.com), alhambra (alhambra@infornexus.com): Project loki. Phrack Magazine, 49, Article 6 (1996), http:\/\/www.phrack.org\/show.php?p=49&a=6"},{"key":"10_CR20","volume-title":"Series in Computer networking and Distributed Systems","author":"E. Skoudis","year":"2002","unstructured":"Skoudis, E.: Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses. In: Series in Computer networking and Distributed Systems. Prentice Hall, Upper Saddle River (2002)"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Malan, G.R., Watson, D., Jahanian, F., Howell, P.: Transport and application protocol scrubbing. In: Proceedings of the IEEE INFOCOM 2002 Conference, Tel-Aviv, Israel, pp. 1381\u20131390 (2000)","DOI":"10.1109\/INFCOM.2000.832535"},{"key":"10_CR22","unstructured":"Handley, M., Paxson, V.: Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In: Proceedings of the 10th USENIX Security Symposium, Washington, DC, USA. USENIX Association (2001)"},{"key":"10_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-36415-3_2","volume-title":"Information Hiding","author":"G. Fisk","year":"2003","unstructured":"Fisk, G., Fisk, M., Papadopoulos, C., Neil, J.: Eliminating steganography in internet traffic with active wardens. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 18\u201335. Springer, Heidelberg (2003)"},{"key":"10_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/11558859_19","volume-title":"Information Hiding","author":"S.J. Murdoch","year":"2005","unstructured":"Murdoch, S.J., Lewis, S.: Embedding covert channels into TCP\/IP. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol.\u00a03727, pp. 247\u2013261. Springer, Heidelberg (2005)"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Simmons, G.J.: The prisoners\u2019 problem and the subliminal channel. In: Chaum, D. (ed.) Advances in Cryptology, Proceedings of CRYPTO 1983, pp. 51\u201367. Plenum Press (1984)","DOI":"10.1007\/978-1-4684-4730-9_5"},{"key":"10_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/978-3-540-30114-1_12","volume-title":"Syntax and semantics-preserving application-layer protocol steganography","author":"N.B. Lucena","year":"2004","unstructured":"Lucena, N.B., Pease, J., Yadollahpour, P., Chapin, S.J.: Syntax and semantics-preserving application-layer protocol steganography, Toronto, Canada. LNCS, pp. 164\u2013179. Springer, Heidelberg (2004)"},{"key":"10_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/3-540-49380-8_25","volume-title":"Information Hiding","author":"S. Craver","year":"1998","unstructured":"Craver, S.: On public-key steganography in the presence of an active warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 355\u2013368. Springer, Heidelberg (1998)"},{"issue":"6","key":"10_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5","volume":"28","author":"Stephan Katzenbeisser","year":"2000","unstructured":"Katzenbeisser, S., Petitcolas, F.A.: Information Hiding: Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA (2000)","journal-title":"EDPACS"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Deering, S., Hinden, R.: Internet protocol, version 6 (ipv6) specification (1998) RFC 2460","DOI":"10.17487\/rfc2460"},{"key":"10_CR30","unstructured":"Hagen, S.: IPv6 Essentials. 1st edn. O\u2019Reilly & Associates, Inc., Sebastopol (2002)"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Security architecture for the internet protocol (1998) RFC 2401","DOI":"10.17487\/rfc2401"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Ip authentication header (1998) RFC 2402","DOI":"10.17487\/rfc2402"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Ip encapsulating security payload (esp) (1998) RFC 2406","DOI":"10.17487\/rfc2406"},{"key":"10_CR34","unstructured":"Kent, S., Atkinson, R.: Definition of the differentiated services field (ds field) in the ipv4 and ipv6 header (1998) RFC 2402"},{"key":"10_CR35","unstructured":"(IANA), I.A.N.A.: Protocol numbers (2004), http:\/\/www.iana.org\/assignments\/protocol-numbers"},{"key":"10_CR36","unstructured":"(IANA), I.A.N.A.: IP version 6 parameters (2004), http:\/\/www.iana.org\/assignments\/ipv6-parameters"},{"key":"10_CR37","unstructured":"Graf, T.: Messaging over ipv6 destination options (2003), http:\/\/net.suug.ch\/articles\/2003\/07\/06\/ip6msg.html"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11767831_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T14:05:38Z","timestamp":1736431538000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11767831_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540347453","9783540347460"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/11767831_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}