{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T15:08:20Z","timestamp":1725980900356},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319942674"},{"type":"electronic","value":"9783319942681"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94268-1_26","type":"book-chapter","created":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T08:49:21Z","timestamp":1528793361000},"page":"308-320","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Detection-Resistant Covert Timing Channel Based on Geometric Huffman Coding"],"prefix":"10.1007","author":[{"given":"Jianhua","family":"Liu","sequence":"first","affiliation":[]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Wuji","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,13]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Archibald, R., Ghosal, D.: A covert timing channel based on fountain codes. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 970\u2013977. IEEE (2012)","DOI":"10.1109\/TrustCom.2012.21"},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.cose.2014.03.007","volume":"45","author":"R Archibald","year":"2014","unstructured":"Archibald, R., Ghosal, D.: A comparative analysis of detection metrics for covert timing channels. Comput. Secur. 45, 284\u2013292 (2014)","journal-title":"Comput. Secur."},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Bocherer, G., Mathar, R.: Matching dyadic distributions to channels. In: 2011 Data Compression Conference (DCC), pp. 23\u201332. IEEE (2011)","DOI":"10.1109\/DCC.2011.10"},{"key":"26_CR4","unstructured":"B\u00f6cherer, G.: Capacity-achieving probabilistic shaping for noisy and noiseless channels. Ph.D. thesis, Hochschulbibliothek der Rheinisch-Westf\u00e4lischen Technischen Hochschule Aachen (2012)"},{"key":"26_CR5","unstructured":"Cabuk, S.: Network covert channels: design, analysis, detection, and elimination (2006)"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Cabuk, S., Brodley, C.E., Shields, C.: IP covert timing channels: design and detection. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 178\u2013187. ACM (2004)","DOI":"10.1145\/1030083.1030108"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Gianvecchio, S., Wang, H.: Detecting covert timing channels: an entropy-based approach. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 307\u2013316. ACM (2007)","DOI":"10.1145\/1315245.1315284"},{"key":"26_CR8","unstructured":"Kang, M.H., Moskowitz, I.S., Chincheck, S.: The pump: a decade of covert fun. In: 21st Annual Computer Security Applications Conference, pp. 7\u2013pp. IEEE (2005)"},{"issue":"10","key":"26_CR9","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"BW Lampson","year":"1973","unstructured":"Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613\u2013615 (1973)","journal-title":"Commun. ACM"},{"issue":"2","key":"26_CR10","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/s11235-010-9368-1","volume":"49","author":"G Liu","year":"2012","unstructured":"Liu, G., Zhai, J., Dai, Y.: Network covert timing channel with distribution matching. Telecommun. Syst. 49(2), 199\u2013205 (2012)","journal-title":"Telecommun. Syst."},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-642-04444-1_8","volume-title":"Computer Security \u2013 ESORICS 2009","author":"Y Liu","year":"2009","unstructured":"Liu, Y., Ghosal, D., Armknecht, F., Sadeghi, A.-R., Schulz, S., Katzenbeisser, S.: Hide and seek in time\u2014robust covert timing channels. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 120\u2013135. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04444-1_8"},{"key":"26_CR12","unstructured":"Lou, J., Zhang, M., Fu, P.: Design of network covert transmission scheme based on TCP. Netinfo. Secur. 34\u201339 (2016)"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Martins, D., Guyennet, H.: Attacks with steganography in PHY and MAC layers of 802.15.4 protocol. In: Fifth International Conference on Systems and Networks Communications, pp. 31\u201336 (2010)","DOI":"10.1109\/ICSNC.2010.11"},{"issue":"1","key":"26_CR14","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s004220050414","volume":"78","author":"A Porta","year":"1998","unstructured":"Porta, A., Baselli, G., Liberati, D., Montano, N., Cogliati, C., Gnecchi-Ruscone, T., Malliani, A., Cerutti, S.: Measuring regularity by means of a corrected conditional entropy in sympathetic outflow. Biol. Cybern. 78(1), 71\u201378 (1998)","journal-title":"Biol. Cybern."},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Sellke, S.H., Wang, C.-C., Bagchi, S., Shroff, N.: TCP\/IP timing channels: theory to implementation. In: 2009 IEEE INFOCOM, pp. 2204\u20132212. IEEE (2009)","DOI":"10.1109\/INFCOM.2009.5062145"},{"key":"26_CR16","unstructured":"Shah, G., Molina, A., Blaze, M.: Keyboards and covert channels. In: Conference on Usenix Security Symposium, p. 5 (2006)"},{"issue":"2","key":"26_CR17","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1109\/TDSC.2015.2423680","volume":"13","author":"PL Shrestha","year":"2016","unstructured":"Shrestha, P.L., Hempel, M., Rezaei, F., Sharif, H.: A support vector machine-based framework for detection of covert timing channels. IEEE Trans. Dependable Secur. Comput. 13(2), 274\u2013283 (2016)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"6","key":"26_CR18","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1016\/j.comnet.2010.11.007","volume":"55","author":"RJ Walls","year":"2011","unstructured":"Walls, R.J., Kothari, K., Wright, M.: Liquid: a detection-resistant covert timing channel based on IPD shaping. Comput. Netw. 55(6), 1217\u20131228 (2011)","journal-title":"Comput. Netw."},{"issue":"3","key":"26_CR19","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/COMST.2007.4317620","volume":"9","author":"S Zander","year":"2007","unstructured":"Zander, S., Armitage, G., Branch, P.: A survey of covert channels and countermeasures in computer network protocols. IEEE Commun. Surv. Tutor. 9(3), 44\u201357 (2007)","journal-title":"IEEE Commun. Surv. Tutor."}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94268-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,19]],"date-time":"2019-10-19T06:16:35Z","timestamp":1571465795000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-94268-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319942674","9783319942681"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94268-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}