{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:53:10Z","timestamp":1775145190853,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540874027","type":"print"},{"value":"9783540874034","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87403-4_12","type":"book-chapter","created":{"date-parts":[[2008,9,17]],"date-time":"2008-09-17T11:42:05Z","timestamp":1221651725000},"page":"211-230","source":"Crossref","is-referenced-by-count":79,"title":["Model-Based Covert Timing Channels: Automated Modeling and Evasion"],"prefix":"10.1007","author":[{"given":"Steven","family":"Gianvecchio","sequence":"first","affiliation":[]},{"given":"Haining","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Duminda","family":"Wijesekera","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Department of Defense, U.S.: Trusted computer system evaluation criteria (1985)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Lampson, B.W.: A note on the confinement problem. Communications of the ACM\u00a016(10) (October 1973)","DOI":"10.1145\/362375.362389"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Computer Systems Architecture","author":"Z. Wang","year":"2006","unstructured":"Wang, Z., Lee, R.: Covert and side channels due to processor architecture. In: Jesshope, C., Egan, C. (eds.) ACSAC 2006. LNCS, vol.\u00a04186, Springer, Heidelberg (2006)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Fisk, G., Fisk, M., Papadopoulos, C., Neil, J.: Eliminating steganography in internet traffic with active wardens. In: Proc. of the 2002 International Workshop on Information Hiding (October 2002)","DOI":"10.1007\/3-540-36415-3_2"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Kang, M.H., Moskowitz, I.S.: A pump for rapid, reliable, secure communication. In: Proc. of ACM CCS 1993 (November 1993)","DOI":"10.1145\/168588.168604"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Kang, M.H., Moskowitz, I.S., Lee, D.C.: A network version of the pump. In: Proc. of the 1995 IEEE Symposium on Security and Privacy (May 1995)","DOI":"10.1109\/SECPRI.1995.398929"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Computer Systems Architecture","author":"M.H. Kang","year":"2005","unstructured":"Kang, M.H., Moskowitz, I.S., Chincheck, S.: The pump: A decade of covert fun. In: Srikanthan, T., Xue, J., Chang, C.-H. (eds.) ACSAC 2005. LNCS, vol.\u00a03740. Springer, Heidelberg (2005)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Giles, J., Hajek, B.: An information-theoretic and game-theoretic study of timing channels. IEEE Trans. on Information Theory\u00a048(9) (September 2002)","DOI":"10.1109\/TIT.2002.801405"},{"key":"12_CR9","unstructured":"Berk, V., Giani, A., Cybenko, G.: Covert channel detection using process query systems. In: Proc. of FLOCON 2005 (September 2005)"},{"key":"12_CR10","unstructured":"Berk, V., Giani, A., Cybenko, G.: Detection of covert channel encoding in network packet delays. Technical Report TR2005-536, Department of Computer Science, Dartmouth College, Hanover, NH., USA (August 2005)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Cabuk, S., Brodley, C., Shields, C.: IP covert timing channels: Design and detection. In: Proc. of ACM CCS (October 2004)","DOI":"10.1145\/1030083.1030108"},{"key":"12_CR12","unstructured":"Shah, G., Molina, A., Blaze, M.: Keyboards and covert channels. In: Proc. of the 2006 USENIX Security Symposium (July\u2013August, 2006)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Gianvecchio, S., Wang, H.: Detecting covert timing channels: An entropy-based approach. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security (October 2007)","DOI":"10.1145\/1315245.1315284"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-540-74835-9_19","volume-title":"Computer Security \u2013 ESORICS 2007","author":"X. Luo","year":"2007","unstructured":"Luo, X., Chan, E.W.W., Chang, R.K.C.: Cloak: A ten-fold way for reliable covert communications. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 283\u2013298. Springer, Heidelberg (2007)"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Arimoto, S.: An algorithm for computing the capacity of arbitrary discrete memoryless channels. IEEE Trans. on Information Theory\u00a018(1) (January 1972)","DOI":"10.1109\/TIT.1972.1054753"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Blahut, R.E.: Computation of channel capacity and rate-distortion functions. IEEE Trans. on Information Theory\u00a018(4) (July 1972)","DOI":"10.1109\/TIT.1972.1054855"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Borders, K., Prakash, A.: Web tap: Detecting covert web traffic. In: Proc. of ACM CCS 2004 (October 2004)","DOI":"10.1145\/1030083.1030100"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Wang, X., Reeves, D.S.: Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In: Proc. of ACM CCS 2003 (October 2003)","DOI":"10.1145\/948109.948115"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Yu, W., Fu, X., Graham, S., Xuan, D., Zhao, W.: Dsss-based flow marking technique for invisible traceback. In: Proc. of the 2007 IEEE Symposium on Security and Privacy, Washington, DC, USA (May 2007)","DOI":"10.1109\/SP.2007.14"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Peng, P., Ning, P., Reeves, D.S.: On the secrecy of timing-based active watermarking trace-back techniques. In: Proc. of the 2006 IEEE Symposium on Security and Privacy (May 2006)","DOI":"10.1109\/SP.2006.28"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Moskowitz, I.S., Kang, M.H.: Covert channels - here to stay? In: Proc. of the 1994 Annual Conf. on Computer Assurance (June 1994)","DOI":"10.1109\/CMPASS.1994.318449"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Cao, J., Cleveland, W.S., Lin, D., Sun, D.X.: On the nonstationarity of internet traffic. In: Proc. of SIGMETRICS\/Performance 2001 (June 2001)","DOI":"10.1145\/378420.378440"},{"key":"12_CR23","volume-title":"Discrete-Event Simulation: A First Course","author":"L. Leemis","year":"2006","unstructured":"Leemis, L., Park, S.K.: Discrete-Event Simulation: A First Course. Prentice-Hall, Upper Saddle River (2006)"},{"key":"12_CR24","unstructured":"Zheng, L., Zhang, L., Xu, D.: Characteristics of network delay and delay jitter and its effect on oice over IP (VoIP). In: Proc. of the 2001 IEEE International Conf. on Communications (June 2001)"},{"key":"12_CR25","volume-title":"Pattern Classification","author":"R. Duda","year":"2001","unstructured":"Duda, R., Hart, P., Stork, D.: Pattern Classification. Wiley-Interscience, New York (2001)"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87403-4_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:37:25Z","timestamp":1606185445000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87403-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540874027","9783540874034"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87403-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}