{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:13:47Z","timestamp":1763468027591,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642241772"},{"type":"electronic","value":"9783642241789"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24178-9_22","type":"book-chapter","created":{"date-parts":[[2011,9,7]],"date-time":"2011-09-07T10:49:45Z","timestamp":1315392585000},"page":"314-328","source":"Crossref","is-referenced-by-count":26,"title":["CoCo: Coding-Based Covert Timing Channels for Network Flows"],"prefix":"10.1007","author":[{"given":"Amir","family":"Houmansadr","sequence":"first","affiliation":[]},{"given":"Nikita","family":"Borisov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Bavier, A., Bowman, M., Chun, B., Culler, D., Karlin, S., Muir, S., Peterson, L., Roscoe, T., Spalink, T., Wawrzoniak, M.: Operating systems support for planetary-scale network services. In: Morris, R., Savage, S. (eds.) Symposium on Networked Systems Design and Implementation, pp. 253\u2013266. USENIX (March 2004)"},{"key":"22_CR2","unstructured":"Berk, V., Giani, A., Cybenko, G.: Detection of covert channel encoding in network packet delays. Tech. Rep. TR2005-536, Dartmouth College, Computer Science, Hanover, NH (August 2005), http:\/\/www.cs.dartmouth.edu\/reports\/TR2005-536-rev1.pdf"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Cabuk, Brodley, Shields: IP covert timing channels: Design and detection. In: SIGSAC: 11th ACM Conference on Computer and Communications Security. ACM SIGSAC (2004)","DOI":"10.1145\/1030083.1030108"},{"key":"22_CR4","unstructured":"Cabuk, S.: Network covert channels: Design, analysis, detection, and elimination (January 2006), http:\/\/docs.lib.purdue.edu\/dissertations\/AAI3260014"},{"key":"22_CR5","unstructured":"Department of Defense: DoD 5200.28-STD: Department of Defense (DoD) Trusted Computer System Evaluation Criteria (TCSEC) (1985)"},{"key":"22_CR6","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2001","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley, Chichester (2001), http:\/\/www.rii.ricoh.com\/~stork\/DHS.html"},{"key":"22_CR7","first-page":"307","volume-title":"ACM Conference on Computer and Communications Security","author":"S. Gianvecchio","year":"2007","unstructured":"Gianvecchio, S., Wang, H.: Detecting covert timing channels: an entropy-based approach. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 307\u2013316. ACM, New York (2007), http:\/\/doi.acm.org\/10.1145\/1315245.1315284"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-540-87403-4_12","volume-title":"Recent Advances in Intrusion Detection","author":"S. Gianvecchio","year":"2008","unstructured":"Gianvecchio, S., Wang, H., Wijesekera, D., Jajodia, S.: Model-based covert timing channels: Automated modeling and evasion. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.\u00a05230, pp. 211\u2013230. Springer, Heidelberg (2008), http:\/\/dx.doi.org\/10.1007\/978-3-540-87403-4_12"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/3-540-36467-6_15","volume-title":"Privacy Enhancing Technologies","author":"J. Giffin","year":"2003","unstructured":"Giffin, J., Greenstadt, R., Litwack, P., Tibbetts, R.: Covert messaging through TCP timestamps. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 194\u2013208. Springer, Heidelberg (2003)"},{"issue":"9","key":"22_CR10","doi-asserted-by":"publisher","first-page":"2455","DOI":"10.1109\/TIT.2002.801405","volume":"48","author":"J. Giles","year":"2002","unstructured":"Giles, J., Hajek, B.: An information-theoretic and game-theoretic study of timing channels. IEEE Transactions on Information Theory\u00a048(9), 2455\u20132477 (2002)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"22_CR11","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1109\/TSE.1987.233153","volume":"SE-13","author":"C.G. Girling","year":"1987","unstructured":"Girling, C.G.: Covert channels in LAN\u2019s. IEEE Transactions in Software Engineering\u00a0SE-13(2), 292\u2013296 (1987)","journal-title":"IEEE Transactions in Software Engineering"},{"key":"22_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61996-8_29","volume-title":"Information Hiding","author":"Handel","year":"1996","unstructured":"Handel, Sandford.: Hiding data in the OSI network model. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, Springer, Heidelberg (1996)"},{"key":"22_CR13","volume-title":"Introduction to Coding Theory","author":"J.H. Lint van","year":"1998","unstructured":"van Lint, J.H.: Introduction to Coding Theory, 3rd edn. Springer, Berlin (1998)","edition":"3"},{"key":"22_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-642-04444-1_8","volume-title":"Computer Security \u2013 ESORICS 2009","author":"Y. Liu","year":"2009","unstructured":"Liu, Y., Ghosal, D., Armknecht, F., Sadeghi, A.R., Schulz, S., Katzenbeisser, S.: Hide and seek in time \u2014 robust covert timing channels. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 120\u2013135. Springer, Heidelberg (2009), http:\/\/dx.doi.org\/10.1007\/978-3-642-04444-1"},{"key":"22_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-642-16435-4_15","volume-title":"Information Hiding","author":"Y. Liu","year":"2010","unstructured":"Liu, Y., Ghosal, D., Armknecht, F., Sadeghi, A.R., Schulz, S., Katzenbeisser, S.: Robust and undetectable steganographic timing channels for i.i.d. Traffic. In: B\u00f6hme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol.\u00a06387, pp. 193\u2013207. Springer, Heidelberg (2010), http:\/\/dx.doi.org\/10.1007\/978-3-642-16435-4"},{"key":"22_CR16","unstructured":"MacKay, D.: Information Theory, Inference, and Learning Algorithms (September 2003)"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/11558859_19","volume-title":"Information Hiding","author":"S.J. Murdoch","year":"2005","unstructured":"Murdoch, S.J., Lewis, S.: Embedding covert channels into TCP\/IP. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol.\u00a03727, pp. 247\u2013261. Springer, Heidelberg (2005), http:\/\/dx.doi.org\/10.1007\/11558859_19"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Padlipsky, M., Snow, D., Karger, P.: Limitations of end-to-end encryption in secure computer networks. Tech. Rep. ESD TR-78-158, Mitre Corporation (1978)","DOI":"10.21236\/ADA059221"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Rowland, C.H.: Covert channels in the TCP\/IP protocol suite. First Monday\u00a02(5) (1997), http:\/\/firstmonday.org\/issues\/issue2_5\/rowland\/index.html","DOI":"10.5210\/fm.v2i5.528"},{"key":"22_CR20","first-page":"2204","volume-title":"INFOCOM","author":"S.H. Sellke","year":"2009","unstructured":"Sellke, S.H., Wang, C.C., Bagchi, S., Shroff, N.B.: Tcp\/ip timing channels: Theory to implementation. In: INFOCOM, pp. 2204\u20132212. IEEE, Los Alamitos (2009)"},{"key":"22_CR21","volume-title":"Proceedings of the 15th Conference on USENIX Security Symposium","author":"G. Shah","year":"2006","unstructured":"Shah, G., Molina, A., Blaze, M.: Keyboards and covert channels. In: Proceedings of the 15th Conference on USENIX Security Symposium, vol.\u00a015, USENIX Association, Berkeley (2006), http:\/\/portal.acm.org\/citation.cfm?id=1267336.1267341"},{"key":"22_CR22","unstructured":"Walsworth, C., Aben, E., Claffy, K.C., Andersen, D.: The CAIDA anonymized 2009 Internet traces\u2014January (March 2009), http:\/\/www.caida.org\/data\/passive\/passive_2009_dataset.xml"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24178-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T22:49:01Z","timestamp":1560552541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24178-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642241772","9783642241789"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24178-9_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}