{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T04:56:00Z","timestamp":1764305760487,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030415785"},{"type":"electronic","value":"9783030415792"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41579-2_47","type":"book-chapter","created":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T16:09:09Z","timestamp":1581955749000},"page":"814-830","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["DLchain: A Covert Channel over Blockchain Based on Dynamic Labels"],"prefix":"10.1007","author":[{"given":"Jing","family":"Tian","sequence":"first","affiliation":[]},{"given":"Gaopeng","family":"Gou","sequence":"additional","affiliation":[]},{"given":"Chang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yige","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,18]]},"reference":[{"key":"47_CR1","unstructured":"Botchain. https:\/\/botchain.network\/"},{"key":"47_CR2","unstructured":"Identify Chinese cyber espionage group. https:\/\/tinyurl.com\/pntdm64"},{"key":"47_CR3","unstructured":"A web about op$$\\_$$return. https:\/\/opreturn.org"},{"key":"47_CR4","unstructured":"Adair, S., Deibert, R., Rohozinski, R.: Shadows in the cloud: investigating cyber espionage 2.0. A joint report of the Information Warfare Monitor and Shadowserver Foundation (2010). http:\/\/shadows-in-the-cloud.net"},{"issue":"4","key":"47_CR5","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/s10207-017-0379-8","volume":"17","author":"ST Ali","year":"2018","unstructured":"Ali, S.T., McCorry, P., Lee, P.H., Hao, F.: ZombieCoin 2.0: managing next-generation botnets using bitcoin. Int. J. Inf. Secur. 17(4), 411\u2013422 (2018)","journal-title":"Int. J. Inf. Secur."},{"key":"47_CR6","unstructured":"Apodaca, R.: Op$$\\_$$return and the future of bitcoin. Bitzuma (2014)"},{"key":"47_CR7","doi-asserted-by":"publisher","unstructured":"Arp, D., Yamaguchi, F., Rieck, K.: Torben: a practical side-channel attack for deanonymizing tor communication. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2015, Singapore, 14\u201317 April 2015, pp. 597\u2013602 (2015). https:\/\/doi.org\/10.1145\/2714576.2714627","DOI":"10.1145\/2714576.2714627"},{"key":"47_CR8","unstructured":"BADER, J.: Domain generation algorithm analyses. Blog posts on various DGAs (2015). http:\/\/www.johannesbader.ch\/tag\/dga\/"},{"key":"47_CR9","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-0-387-44599-1_8","volume-title":"Malware Detection","author":"P Barford","year":"2007","unstructured":"Barford, P., Yegneswaran, V.: An inside look at botnets. In: Christodorescu, M., Jha, S., Maughan, D., Song, D., Wang, C. (eds.) Malware Detection. Advances in Information Security, vol. 27, pp. 171\u2013191. Springer, Boston (2007). https:\/\/doi.org\/10.1007\/978-0-387-44599-1_8"},{"key":"47_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-319-70278-0_14","volume-title":"Financial Cryptography and Data Security","author":"M Bartoletti","year":"2017","unstructured":"Bartoletti, M., Pompianu, L.: An analysis of bitcoin OP$$\\_$$RETURN metadata. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 218\u2013230. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_14"},{"key":"47_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-662-45472-5_11","volume-title":"Financial Cryptography and Data Security","author":"JW Bos","year":"2014","unstructured":"Bos, J.W., Halderman, J.A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 157\u2013175. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_11"},{"key":"47_CR12","unstructured":"Bradbury, D.: Blocksign utilises block chain to verify signed contracts. Coindesk (2014)"},{"key":"47_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9","volume-title":"Financial Cryptography and Data Security","year":"2015","unstructured":"Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.): FC 2015. LNCS, vol. 8976. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48051-9"},{"key":"47_CR14","unstructured":"Deibert, R., Rohozinski, R., Manchanda, A.: Tracking GhostNet: investigating a cyber espionage network. Munk Centre for International Studies, University of Toronto (2009)"},{"key":"47_CR15","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA, 9\u201313 August 2004, pp. 303\u2013320 (2004)","DOI":"10.21236\/ADA465464"},{"key":"47_CR16","doi-asserted-by":"crossref","unstructured":"Frkat, D., Annessi, R., Zseby, T.: ChainChannels: private botnet communication over public blockchains. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), iThings\/GreenCom\/CPSCom\/SmartData 2018, Halifax, NS, Canada, 30 July\u20133 August 2018, pp. 1244\u20131252 (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00219"},{"key":"47_CR17","doi-asserted-by":"crossref","unstructured":"Gianvecchio, S., Wang, H.: Detecting covert timing channels: an entropy-based approach. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 307\u2013316. ACM (2007)","DOI":"10.1145\/1315245.1315284"},{"key":"47_CR18","unstructured":"Kirk, J.: Could the bitcoin network be used as an ultrasecure notary service? ComputerWorld, 23 May 2013"},{"issue":"6","key":"47_CR19","doi-asserted-by":"publisher","first-page":"1513","DOI":"10.1007\/s11222-016-9701-y","volume":"27","author":"N Kordzakhia","year":"2017","unstructured":"Kordzakhia, N., Novikov, A., Ycart, B.: Approximations for weighted Kolmogorov-Smirnov distributions via boundary crossing probabilities. Stat. Comput. 27(6), 1513\u20131523 (2017)","journal-title":"Stat. Comput."},{"issue":"318","key":"47_CR20","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1080\/01621459.1967.10482916","volume":"62","author":"HW Lilliefors","year":"1967","unstructured":"Lilliefors, H.W.: On the Kolmogorov-Smirnov test for normality with mean and variance unknown. J. Am. Stat. Assoc. 62(318), 399\u2013402 (1967)","journal-title":"J. Am. Stat. Assoc."},{"key":"47_CR21","doi-asserted-by":"crossref","unstructured":"Mani, A., Wilson-Brown, T., Jansen, R., Johnson, A., Sherr, M.: Understanding tor usage with privacy-preserving measurement. In: Proceedings of the Internet Measurement Conference 2018, IMC 2018, Boston, MA, USA, 31 October\u201302 November 2018, pp. 175\u2013187 (2018)","DOI":"10.1145\/3278532.3278549"},{"key":"47_CR22","doi-asserted-by":"crossref","unstructured":"Matzutt, R., Henze, M., Ziegeldorf, J.H., Hiller, J., Wehrle, K.: Thwarting unwanted blockchain content insertion. In: 2018 IEEE International Conference on Cloud Engineering, IC2E 2018, Orlando, FL, USA, 17\u201320 April 2018, pp. 364\u2013370 (2018)","DOI":"10.1109\/IC2E.2018.00070"},{"key":"47_CR23","doi-asserted-by":"publisher","unstructured":"Millen, J.K.: 20 years of covert channel modeling and analysis. In: 1999 IEEE Symposium on Security and Privacy, Oakland, California, USA, 9\u201312 May 1999, pp. 113\u2013114 (1999). https:\/\/doi.org\/10.1109\/SECPRI.1999.766906","DOI":"10.1109\/SECPRI.1999.766906"},{"key":"47_CR24","unstructured":"Nakamoto, S., et al.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)"},{"key":"47_CR25","doi-asserted-by":"crossref","unstructured":"Nasr, M., Bahramali, A., Houmansadr, A.: DeepCorr: strong flow correlation attacks on tor using deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, 15\u201319 October 2018, pp. 1962\u20131976 (2018)","DOI":"10.1145\/3243734.3243824"},{"key":"47_CR26","doi-asserted-by":"publisher","unstructured":"Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless monster: exploring the ecosystem of web-based device fingerprinting. In: 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, 19\u201322 May 2013, pp. 541\u2013555 (2013). https:\/\/doi.org\/10.1109\/SP.2013.43","DOI":"10.1109\/SP.2013.43"},{"key":"47_CR27","unstructured":"Piotrowska, A.M., Hayes, J., Elahi, T., Meiser, S., Danezis, G.: The Loopix anonymity system. In: 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, 16\u201318 August 2017, pp. 1199\u20131216 (2017)"},{"key":"47_CR28","unstructured":"Plohmann, D.: Dgaarchive: A deep dive into domain generating malware. https:\/\/www.botconf.eu\/wp-content\/uploads\/2015\/12\/OK-P06-Plohmann-DGArchive.pdf"},{"key":"47_CR29","unstructured":"Plohmann, D., Yakdan, K., Klatt, M., Bader, J., Gerhards-Padilla, E.: A comprehensive measurement study of domain generating malware. In: 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, 10\u201312 August 2016, pp. 263\u2013278 (2016)"},{"issue":"1","key":"47_CR30","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s004220050414","volume":"78","author":"A Porta","year":"1998","unstructured":"Porta, A., et al.: Measuring regularity by means of a corrected conditional entropy in sympathetic outflow. Biol. Cybern. 78(1), 71\u201378 (1998). https:\/\/doi.org\/10.1007\/s004220050414","journal-title":"Biol. Cybern."},{"key":"47_CR31","unstructured":"Sch\u00fcppen, S., Teubert, D., Herrmann, P., Meyer, U.: FANCI: feature-based automated NXdomain classification and intelligence. In: 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, 15\u201317 August 2018, pp. 1165\u20131181 (2018)"},{"key":"47_CR32","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-1-4684-4730-9_5","volume-title":"Advances in Cryptology","author":"GJ Simmons","year":"1983","unstructured":"Simmons, G.J.: The prisoners\u2019 problem and the subliminal channel. In: Chaum, D. (ed.) Advances in Cryptology, pp. 51\u201367. Springer, Boston (1983). https:\/\/doi.org\/10.1007\/978-1-4684-4730-9_5"},{"key":"47_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/3-540-39757-4_25","volume-title":"Advances in Cryptology","author":"GJ Simmons","year":"1985","unstructured":"Simmons, G.J.: The subliminal channel and digital signatures. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 364\u2013378. Springer, Heidelberg (1985). https:\/\/doi.org\/10.1007\/3-540-39757-4_25"},{"key":"47_CR34","doi-asserted-by":"crossref","unstructured":"Wang, L., Dyer, K.P., Akella, A., Ristenpart, T., Shrimpton, T.: Seeing through network-protocol obfuscation. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 57\u201369. ACM (2015)","DOI":"10.1145\/2810103.2813715"},{"key":"47_CR35","unstructured":"Wu, J.Z., Ding, L.P., Wang, Y.J.: Research on key problems of covert channel in cloud computing. J. China Inst. Commun. 32(9) (2011)"},{"key":"47_CR36","unstructured":"Yanfeng, L., Liping, D., Jingzheng, W., Qiang, C., Xuehua, L., Bei, G.: Research on a new network covert channel model in blockchain environment. J. Commun. (2019)"},{"key":"47_CR37","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.jnca.2018.11.001","volume":"126","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Zhu, L., Wang, X., Zhang, C., Zhu, H., Tan, Y.: A packet-reordering covert channel over volte voice and video traffics. J. Netw. Comput. Appl. 126, 29\u201338 (2019). https:\/\/doi.org\/10.1016\/j.jnca.2018.11.001","journal-title":"J. Netw. Comput. Appl."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41579-2_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T20:35:56Z","timestamp":1606422956000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41579-2_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030415785","9783030415792"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41579-2_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"199","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}