{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:14:43Z","timestamp":1742955283186,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748342"},{"type":"electronic","value":"9783540748359"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74835-9_9","type":"book-chapter","created":{"date-parts":[[2007,9,7]],"date-time":"2007-09-07T14:03:08Z","timestamp":1189173788000},"page":"122-138","source":"Crossref","is-referenced-by-count":2,"title":["SilentKnock: Practical, Provably Undetectable Authentication"],"prefix":"10.1007","author":[{"given":"Eugene Y.","family":"Vasserman","sequence":"first","affiliation":[]},{"given":"Nicholas","family":"Hopper","sequence":"additional","affiliation":[]},{"given":"John","family":"Laxson","sequence":"additional","affiliation":[]},{"given":"James","family":"Tyra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"9_CR1","first-page":"12","volume":"12","author":"M. Krzywinski","year":"2003","unstructured":"Krzywinski, M.: Port knocking: Network authentication across closed ports. SysAdmin Magazine\u00a012(6), 12\u201317 (2003)","journal-title":"SysAdmin Magazine"},{"key":"9_CR2","unstructured":"Barham, P., Hand, S., Isaacs, R., Jardetzky, P., Mortier, R., Roscoe, T.: Techniques for lightweight concealment and authentication in IP networks. Technical Report IRB-TR-02-009, Intel Research Berkeley (July 2002)"},{"key":"9_CR3","unstructured":"Worth, D.: C\u00d6K: Cryptographic one-time knocking. In: Black Hat USA (2004)"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","first-page":"451","volume-title":"Advances in Computer Systems Architecture","author":"R. deGraaf","year":"2005","unstructured":"deGraaf, R., Aycock, J., Jacobson, M.J.: Improved port knocking with strong authentication. In: Srikanthan, T., Xue, J., Chang, C.-H. (eds.) ACSAC 2005. LNCS, vol.\u00a03740, pp. 451\u2013462. Springer, Heidelberg (2005)"},{"key":"9_CR5","unstructured":"Fluhrer, S., Mantin, I., Shamir, A.: Attacks on RC4 and WEP. RSA Laboratories, Cryptobytes\u00a05(2) (2002)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Bellare, M., Kohno, T., Namprempre, C.: Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. In: Proc. CCS 2002, pp. 1\u201311 (2002)","DOI":"10.1145\/586110.586112"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"D. Bleichenbacher","year":"1998","unstructured":"Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS# 1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 1\u201312. Springer, Heidelberg (1998)"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/3-540-45708-9_6","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"N.J. Hopper","year":"2002","unstructured":"Hopper, N.J., Langford, J., Von Ahn, L.: Provably secure steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 77\u201392. Springer, Heidelberg (2002)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/11558859_19","volume-title":"Information Hiding","author":"S.J. Murdoch","year":"2005","unstructured":"Murdoch, S.J., Lewis, S.: Embedding covert channels into TCP\/IP. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol.\u00a03727, pp. 247\u2013261. Springer, Heidelberg (2005)"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"Fast Software Encryption","author":"D.J. Bernstein","year":"2005","unstructured":"Bernstein, D.J.: The Poly1305-AES message authentication code. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, Springer, Heidelberg (2005)"},{"key":"9_CR11","unstructured":"Linux 2.6.17.13 kernel source. drivers\/char\/random.c"},{"key":"9_CR12","unstructured":"Vasserman, E.Y., Hopper, N., Laxson, J., Tyra, J.: Silentknock (April 2007), http:\/\/www.cs.umn.edu\/~eyv\/knock\/"},{"key":"9_CR13","unstructured":"Krzywinski, M.: Port knocking, http:\/\/www.portknocking.org\/"},{"key":"9_CR14","unstructured":"Graham-Cumming, J.: Practical secure port knocking. Dr. Dobb\u2019s Journal (November 2004)"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1292","DOI":"10.1007\/11424925_134","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"A.I. Manzanares","year":"2005","unstructured":"Manzanares, A.I., Marquez, J.T., Estevez-Tapiador, J.M., Castro, J.C.H.: Attacks on port knocking authentication mechanism. In: Gervasi, O., Gavrilova, M., Kumar, V., Lagan\u00e0, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol.\u00a03483, pp. 1292\u20131300. Springer, Heidelberg (2005)"},{"key":"9_CR16","volume-title":"Proc. Workshop on Multimedia Security at ACM Multimedia","author":"D.K. Ahsan","year":"2002","unstructured":"Ahsan, D.K.: Practical data hiding in TCP\/IP. In: Proc. Workshop on Multimedia Security at ACM Multimedia, ACM Press, New York (2002)"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Rowland, C.H.: Covert channels in the TCP\/IP protocol suite. First Monday\u00a02(5) (1997)","DOI":"10.5210\/fm.v2i5.528"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Conehead: Stego hasho. Phrack\u00a09(55) (1999)","DOI":"10.1353\/art.1999.0085"},{"key":"9_CR19","unstructured":"MacDermid, T.: Stegtunnel, http:\/\/www.synacklabs.net\/OOB\/stegtunnel.html"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Ahn, L.v., Hopper, N., Langford, J.: Covert two-party computation. In: Proc. STOC 2005, pp. 513\u2013522 (2005)","DOI":"10.1145\/1060590.1060668"},{"key":"9_CR21","unstructured":"Bond, M., Danezis, G.: The dining freemasons: Security protocols for secret societies. In: Proc. 13th International Workshop on Security Protocols, Cambridge, England (April 2005)"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Heffernan, A.: Protection of BGP sessions via the TCP MD5 signature option (1998), http:\/\/www.ietf.org\/rfc\/rfc2385.txt","DOI":"10.17487\/rfc2385"},{"key":"9_CR23","volume-title":"Rootkits: Subverting the Windows Kernel","author":"G. Hoglund","year":"2005","unstructured":"Hoglund, G., Butler, J.: Rootkits: Subverting the Windows Kernel. Addison-Wesley Professional, Reading (2005)"},{"issue":"4","key":"9_CR24","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSP.2004.57","volume":"2","author":"S. Ring","year":"2004","unstructured":"Ring, S., Cole, E.: Taking a lesson from stealthy rootkits. IEEE Security and Privacy\u00a02(4), 38\u201345 (2004)","journal-title":"IEEE Security and Privacy"},{"key":"9_CR25","unstructured":"Welte, H., Kadlecsik, J., Josefsson, M., McHardy, P., Kozakai, Y., Morris, J., Boucher, M., Russell, R.: The netfilter.org project, http:\/\/www.netfilter.org\/"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Postel, J. (ed.): Transmission control protocol (1981), http:\/\/www.ietf.org\/rfc\/rfc0793.txt","DOI":"10.17487\/rfc0793"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Carter, J.L., Wegman, M.N.: Universal classes of hash functions (extended abstract). In: Proc. STOC 1977, pp. 106\u2013112 (1977)","DOI":"10.1145\/800105.803400"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Aikat, J., Kaur, J., Smith, F.D., Jeffay, K.: Variability in TCP round-trip times. In: Proc. IMC 2003, pp. 279\u2013284 (2003)","DOI":"10.1145\/948205.948241"},{"issue":"2","key":"9_CR29","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/378444.378449","volume":"19","author":"S.M. Bellovin","year":"1989","unstructured":"Bellovin, S.M.: Security problems in the TCP\/IP protocol suite. SIGCOMM Comput. Commun. Rev.\u00a019(2), 32\u201348 (1989)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: IP authentication header (November 1998), http:\/\/www.ietf.org\/rfc\/rfc2402.txt","DOI":"10.17487\/rfc2402"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Jacobson, V., Braden, R., Borman, D.: TCP extensions for high performance (1992), http:\/\/www.ietf.org\/rfc\/rfc1323.txt","DOI":"10.17487\/rfc1323"},{"key":"9_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/3-540-68697-5_24","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"V. Shoup","year":"1996","unstructured":"Shoup, V.: On fast and provably secure message authentication based on universal hashing. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 313\u2013328. Springer, Heidelberg (1996)"},{"issue":"3","key":"9_CR33","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. SIAM J. Comput.\u00a032(3), 586\u2013615 (2003)","journal-title":"SIAM J. Comput."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74835-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T21:43:41Z","timestamp":1737409421000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74835-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540748342","9783540748359"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74835-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}