{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:53:15Z","timestamp":1755838395307,"version":"3.40.4"},"publisher-location":"Wiesbaden","reference-count":35,"publisher":"Springer Fachmedien Wiesbaden","isbn-type":[{"type":"print","value":"9783658067076"},{"type":"electronic","value":"9783658067083"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-658-06708-3_9","type":"book-chapter","created":{"date-parts":[[2014,10,17]],"date-time":"2014-10-17T06:50:27Z","timestamp":1413528627000},"page":"123-133","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Hidden and Uncontrolled \u2013 On the Emergence of Network Steganographic Threats"],"prefix":"10.1007","author":[{"given":"Steffen","family":"Wendzel","sequence":"first","affiliation":[]},{"given":"Wojciech","family":"Mazurczyk","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Caviglione","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Meier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,18]]},"reference":[{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"[ACGT14] Ambrosin, M., Conti, M., Gasti, P., Tsudik, G.: In Proc. of the 9th ACM symposium on Information, Computer and Communications Security (ASIA-CCS), 2014, pp. 15-26","DOI":"10.1145\/2590296.2590306"},{"key":"9_CR34","unstructured":"[BaWK12] Backs, P., Wendzel, S., Keller, J.: Dynamic Routing in Covert Channel Overlays Based on Dynamic Routing Protocols, in Proc. International Workshop on Information Security Theory and Practice, pp. 32-29, IEEE, London, 2012."},{"key":"9_CR35","unstructured":"[BiMS11] Bia\u0142czak, P., Mazurczyk, W., Szczypiorski, S.: Sending Hidden Data via Google Suggest, 2011 International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM 2011), Prague, Czech Republic, 2011, pp. 121-131,"},{"key":"9_CR36","unstructured":"[Daem97] Daemon9: LOKI2 (the implementation) Phrack Magazine, vol. 7(5), http:\/\/www.phrack.com\/issues.html?issue=51&id=6&mode=txt, 1997."},{"key":"9_CR37","unstructured":"[Depa85] Department of Defense (DoD): Trusted Computer System Evaluation Criteria (TCSEC, Orange Book), DoD, 1985."},{"key":"9_CR38","doi-asserted-by":"crossref","unstructured":"[FrMS11] Fr\u0105czek, W., Mazurczyk, W., Szczypiorski, K.: How Hidden Can Be Even More Hidden?, In Proc. of 2011 International Conference on Multimedia Information Networking and Security (MINES 2011), Shanghai, China, 4-6 November, 2011","DOI":"10.1109\/MINES.2011.97"},{"key":"9_CR39","doi-asserted-by":"crossref","unstructured":"[FrMS12a] Fr\u0105czek, W., Mazurczyk, W., Szczypiorski, K.: Hiding information in Stream Control Transmission Protocol, Computer Communications, vol. 35, no. 2, pp. 159\u2013169, 2012.","DOI":"10.1016\/j.comcom.2011.08.009"},{"key":"9_CR40","unstructured":"[FrMS12b] Fr\u0105czek, W., Mazurczyk, W., Szczypiorski, K.: Multi-Level Steganography: Improving Hidden Communication in Networks, Journal of Universal Computer Science (J. UCS), Vol. 18, No. 14, 2012, pp. 1967-1986"},{"key":"9_CR41","unstructured":"[GraS14] Grabska, I., Szczypiorski, K.: Steganography in LTE, Proc. of International Workshop on Cyber Crime (IWCC 2014), San Jose, USA, May 2014"},{"key":"9_CR42","doi-asserted-by":"crossref","unstructured":"[Girl87] Girling, C.G.: Covert Channels in LAN\u2019s, In: IEEE Transactions on Software Engineering, pp. 292-296, IEEE, February 1987.","DOI":"10.1109\/TSE.1987.233153"},{"key":"9_CR43","unstructured":"[JaWS13] Jankowski, B., Mazurczyk, W., Szczypiorski, K.: PadSteg: Introducing inter-protocol steganography, In: Telecommunication Systems: Modelling, Analysis, Design and Management, Vol. 52, Iss. 2, pp. 1101-1111, 2013"},{"key":"9_CR44","doi-asserted-by":"crossref","unstructured":"[KoMS13] Kopiczko, P., Mazurczyk, W., Szczypiorski, K.: StegTorrent: a steganographic method for P2P files sharing service, Proc. of International Workshop on Cyber Crime (IWCC 2013), San Francisco, USA, May 2013","DOI":"10.1109\/SPW.2013.11"},{"key":"9_CR45","doi-asserted-by":"crossref","unstructured":"[LalW13] Lalande, J. F., Wendzel, S.: Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels, in Proc. of ECTCM Workshop @ ARES\u201913, Regensburg, Germany, pp. 701 \u2013 710, 2013.","DOI":"10.1109\/ARES.2013.92"},{"key":"9_CR46","doi-asserted-by":"crossref","unstructured":"[Lamp73] Lampson, B.W.: A Note on the Confinement Problem, In: Communications of the ACM, vol. 16(10), pp. 613-615, ACM, October 1973.","DOI":"10.1145\/362375.362389"},{"key":"9_CR47","doi-asserted-by":"crossref","unstructured":"[LuWS10] Lubacz, J., Mazurczyk, W., Szczypiorski, K.: Vice over IP, IEEE Spectrum,, pp. 40-45, February 2010.","DOI":"10.1109\/MSPEC.2010.5397787"},{"key":"9_CR48","doi-asserted-by":"crossref","unstructured":"[MaFC12] Marforio, C., Ritzdorf, H., Francillon, A., Capkun, S.: Analysis of the communication between colluding applications on modern smartphones, in Proc. of the 28th Annual Computer Security Applications Conference (ACSAC), Orlando, USA, pp. 51 \u2013 60, Dec. 2012.","DOI":"10.1145\/2420950.2420958"},{"key":"9_CR49","doi-asserted-by":"crossref","unstructured":"[MaKS13] Mazurczyk, W., Kara\u015b, M., Szczypiorski, K.: SkyDe: a Skype-based Steganographic Method, W: International Journal of Computers, Communications & Control (IJCCC), 8(3), pp. 389-400, June 2013.","DOI":"10.15837\/ijccc.2013.3.469"},{"key":"9_CR50","doi-asserted-by":"crossref","unstructured":"[MaSS12] Mazurczyk, W., Szaga, P., Szczypiorski, K.: Using Transcoding for Hidden Communication in IP Telephony, Multimedia Tools and Applications, 2012.","DOI":"10.1007\/s11042-012-1224-8"},{"key":"9_CR51","unstructured":"[MazC14] Mazurczyk, W., Caviglione, L.: Steganography in Modern Smartphones and Mitigation Techniques, IEEE Communications Surveys & Tutorials, in press."},{"key":"9_CR52","doi-asserted-by":"crossref","unstructured":"[Mazu14] Mazurczyk, W.: VoIP Steganography and Its Detection \u2013 A Survey, ACM Computing Surveys, Vol. 46, Iss. 2, June 2014.","DOI":"10.1145\/2543581.2543587"},{"key":"9_CR53","doi-asserted-by":"crossref","unstructured":"[MWIS14] Mazurczyk, W., Wendzel, S., Villares, I.A., Szczypiorski, K.: On the Importance of Steganographic Cost for Network Steganography, Arxiv.org, http:\/\/arxiv.org\/abs\/1406.2519, currently under review, 2014.","DOI":"10.1002\/sec.1085"},{"key":"9_CR54","unstructured":"[Prin13] Prince, B.: Attackers Hide Communication Within Linux Backdoor, http:\/\/www.securityweek.com\/attackers-hide-communication-linux-backdoor, Security Week, November 2013."},{"key":"9_CR55","doi-asserted-by":"crossref","unstructured":"[RTSS09] Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, in Proc. of the 16th ACM CCS, 2009, pp. 199\u2013212","DOI":"10.1145\/1653662.1653687"},{"key":"9_CR56","unstructured":"[SZIK11] Schlegel, R., Zhang, K., Zhou, X., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones, in Proc. of Network and Distributed System Security Symposium, San Diego, USA, Feb. 2011."},{"key":"9_CR57","unstructured":"[Stod09] St\u00f8dle, D.: Ping Tunnel \u2013 For those times when everything else is blocked, 2009."},{"key":"9_CR58","doi-asserted-by":"crossref","unstructured":"[SzcW11] Szczypiorski, K., Mazurczyk, W.: Steganography in IEEE 802.11 OFDM symbols, Security and Communication Networks, vol. 3, pp. 1\u201312, 2011","DOI":"10.1002\/sec.306"},{"key":"9_CR59","unstructured":"[Szczy03] Szczypiorski, K.: Steganography in TCP\/IP networks \u2013 State of the Art and a Proposal of a New System\u2013HICCUPS, Institute of Telecommunications\u2019 seminar, Warsaw University of Technology, Poland, 2003."},{"key":"9_CR60","unstructured":"[SzIW07] Szczypiorski, K., Margasi\u0144ski, I., Mazurczyk, W.: Steganographic Routing in Multi Agent System Environment, In: Journal of Information Assurance and Security, vol. 2, pp. 235-243, Dynamic Publishers Inc., 2007."},{"key":"9_CR61","doi-asserted-by":"crossref","unstructured":"[WenK11] Wendzel, S., Keller, J.: Low-attention forwarding for mobile network covert channels, in Proc. 12th Communications and Multimedia Security (CMS 2011), LNCS 7025, pp. 122-133, Springer, Gent, 2011.","DOI":"10.1007\/978-3-642-24712-5_10"},{"key":"9_CR62","doi-asserted-by":"crossref","unstructured":"[WenK12] Wendzel, S., Keller, J.: Systematic Engineering of Control Protocols for Covert Channels, in Proc. 13th Communications and Multimedia Security (CMS 2012), LNCS 7394, pp. 131-144, Springer, Kent, 2012.","DOI":"10.1007\/978-3-642-32805-3_11"},{"key":"9_CR63","doi-asserted-by":"crossref","unstructured":"[WenK14] Wendzel, S., Keller, J.: Hidden and Under Control \u2013 A Survey and Outlook on Covert Channel- internal Control Protocols, In: Annals of Telecommunications, Springer Paris, 2014.","DOI":"10.1007\/s12243-014-0423-x"},{"key":"9_CR64","unstructured":"[WZFH14] Wendzel, S., Zander, S., Fechner, B., Herdin, C.: A Pattern-based Survey and Categorization of Network Covert Channel Techniques, Arxiv.org, http:\/\/arxiv.org\/abs\/1406.2901, currently under review, 2014."},{"key":"9_CR65","unstructured":"[WZMS14] Wendzel, S., Zwanger, V., Meier, M., Szl\u00f3sarczyk, S.: Envisioning Smart Building Botnets, in Proc. Sicherheit 2014, LNI 228, pp. 319-329, GI, Vienna, 2014."},{"key":"9_CR66","doi-asserted-by":"crossref","unstructured":"[YDL+08] Yarochkin, F., Day, S.-Y., Lin, C.-H. et al.: Towards Adaptive Covert Communication System, in Proc. PDRC\u201908, pp. 153-159, IEEE Computer Society, 2008.","DOI":"10.1109\/PRDC.2008.26"},{"key":"9_CR67","doi-asserted-by":"crossref","unstructured":"[ZiMS14] Zieli\u0144ska, E., Mazurczyk, W., Szczypiorski, K.: Trends in Steganography, In: Communications of the ACM, 57(2), pp. 86-95, March 2014.","DOI":"10.1145\/2566590.2566610"}],"container-title":["ISSE 2014 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-658-06708-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T05:43:09Z","timestamp":1746423789000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-658-06708-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783658067076","9783658067083"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-658-06708-3_9","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}