{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:08:02Z","timestamp":1772122082395,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":44,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819996131","type":"print"},{"value":"9789819996148","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-9614-8_11","type":"book-chapter","created":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T15:02:31Z","timestamp":1704294151000},"page":"164-183","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1024-9470","authenticated-orcid":false,"given":"Simone","family":"Soderi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4691-7570","authenticated-orcid":false,"given":"Rocco","family":"De Nicola","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,4]]},"reference":[{"key":"11_CR1","unstructured":"Graphical Network Simulator 3 (GNS3). https:\/\/www.gns3.com\/"},{"key":"11_CR2","unstructured":"Scapy. https:\/\/scapy.net\/"},{"key":"11_CR3","unstructured":"TCPdump. https:\/\/www.tcpdump.org\/"},{"key":"11_CR4","unstructured":"VyOS. https:\/\/vyos.io\/"},{"issue":"4","key":"11_CR5","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1109\/LCSYS.2020.3033059","volume":"5","author":"A Abdelwahab","year":"2021","unstructured":"Abdelwahab, A., Lucia, W., Youssef, A.: Covert channels in cyber-physical systems. IEEE Control Syst. Lett. 5(4), 1273\u20131278 (2021). https:\/\/doi.org\/10.1109\/LCSYS.2020.3033059","journal-title":"IEEE Control Syst. Lett."},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-031-17143-7_26","volume-title":"Computer Security - ESORICS 2022","author":"A Amro","year":"2022","unstructured":"Amro, A., Gkioulos, V.: From click to sink: utilizing AIS for command and control in maritime cyber attacks. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds.) ESORICS 2022, Part III. LNCS, vol. 13556, pp. 535\u2013553. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-17143-7_26"},{"key":"11_CR7","unstructured":"Behringer, M.H., Morrow, M.: MPLS VPN Security. Cisco Press (2005)"},{"issue":"3","key":"11_CR8","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MITP.2018.032501746","volume":"20","author":"K Cabaj","year":"2018","unstructured":"Cabaj, K., Caviglione, L., Mazurczyk, W., Wendzel, S., Woodward, A., Zander, S.: The new threats of information hiding: the road ahead. IT Prof. 20(3), 31\u201339 (2018). https:\/\/doi.org\/10.1109\/MITP.2018.032501746","journal-title":"IT Prof."},{"key":"11_CR9","unstructured":"Cisco Systems: MPLS in the DCN (2007). https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/ios\/solutions_docs\/telco_dcn\/Book\/telco5.html"},{"key":"11_CR10","unstructured":"Cisco Systems: Configuring a Basic MPLS VPN (2020). https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/multiprotocol-label-switching-mpls\/mpls\/13733-mpls-vpn-basic.html"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"130642","DOI":"10.1109\/ACCESS.2022.3229124","volume":"10","author":"G Costa","year":"2022","unstructured":"Costa, G., Pinelli, F., Soderi, S., Tolomei, G.: Turning federated learning systems into covert channels. IEEE Access 10, 130642\u2013130656 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3229124","journal-title":"IEEE Access"},{"key":"11_CR12","unstructured":"Ghein, L.D.: MPLS Fundamentals. Cisco Press (2016)"},{"issue":"5","key":"11_CR13","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/MWC.001.1900516","volume":"27","author":"G Gui","year":"2020","unstructured":"Gui, G., Liu, M., Tang, F., Kato, N., Adachi, F.: 6G: opening new horizons for integration of comfort, security, and intelligence. IEEE Wirel. Commun. 27(5), 126\u2013132 (2020). https:\/\/doi.org\/10.1109\/MWC.001.1900516","journal-title":"IEEE Wirel. Commun."},{"key":"11_CR14","doi-asserted-by":"publisher","unstructured":"Guri, M.: HOTSPOT: crossing the air-gap between isolated PCs and nearby smartphones using temperature. In: 2019 European Intelligence and Security Informatics Conference (EISIC), pp. 94\u2013100 (2019). https:\/\/doi.org\/10.1109\/EISIC49498.2019.9108874","DOI":"10.1109\/EISIC49498.2019.9108874"},{"key":"11_CR15","doi-asserted-by":"publisher","unstructured":"Guri, M.: CD-LEAK: leaking secrets from audioless air-gapped computers using covert acoustic signals from CD\/DVD drives. In: 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), pp. 808\u2013816 (2020). https:\/\/doi.org\/10.1109\/COMPSAC48688.2020.0-163","DOI":"10.1109\/COMPSAC48688.2020.0-163"},{"key":"11_CR16","doi-asserted-by":"publisher","unstructured":"Guri, M.: MAGNETO: covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields. Future Gener. Comput. Syst. 115, 115\u2013125 (2021). https:\/\/doi.org\/10.1016\/j.future.2020.08.045. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X2030916X","DOI":"10.1016\/j.future.2020.08.045"},{"key":"11_CR17","doi-asserted-by":"publisher","unstructured":"Guri, M.: ETHERLED: sending covert Morse signals from air-gapped devices via network card (NIC) LEDs. In: 2022 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 163\u2013170 (2022). https:\/\/doi.org\/10.1109\/CSR54599.2022.9850284","DOI":"10.1109\/CSR54599.2022.9850284"},{"key":"11_CR18","doi-asserted-by":"publisher","unstructured":"Guri, M.: Near field air-gap covert channel attack. In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 490\u2013497 (2022). https:\/\/doi.org\/10.1109\/TrustCom56396.2022.00074","DOI":"10.1109\/TrustCom56396.2022.00074"},{"issue":"1","key":"11_CR19","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/TDSC.2021.3133406","volume":"20","author":"M Guri","year":"2023","unstructured":"Guri, M.: $$POWER$$-$$SUPPLaY$$: leaking sensitive data from air-gapped, audio-gapped systems by turning the power supplies into speakers. IEEE Trans. Dependable Secure Comput. 20(1), 313\u2013330 (2023). https:\/\/doi.org\/10.1109\/TDSC.2021.3133406","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"11_CR20","doi-asserted-by":"publisher","unstructured":"Guri, M., Monitz, M., Mirski, Y., Elovici, Y.: BitWhisper: covert signaling channel between air-gapped computers using thermal manipulations. In: 2015 IEEE 28th Computer Security Foundations Symposium, pp. 276\u2013289 (2015). https:\/\/doi.org\/10.1109\/CSF.2015.26","DOI":"10.1109\/CSF.2015.26"},{"key":"11_CR21","doi-asserted-by":"publisher","unstructured":"Guri, M., Solewicz, Y., Elovici, Y.: MOSQUITO: covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication. In: 2018 IEEE Conference on Dependable and Secure Computing (DSC), pp. 1\u20138 (2018). https:\/\/doi.org\/10.1109\/DESEC.2018.8625124","DOI":"10.1109\/DESEC.2018.8625124"},{"key":"11_CR22","doi-asserted-by":"publisher","unstructured":"Harris, K., Henry, W., Dill, R.: A network-based IoT covert channel. In: 2022 4th International Conference on Computer Communication and the Internet (ICCCI), pp. 91\u201399 (2022). https:\/\/doi.org\/10.1109\/ICCCI55554.2022.9850247","DOI":"10.1109\/ICCCI55554.2022.9850247"},{"issue":"3","key":"11_CR23","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1109\/TNET.2022.3209255","volume":"31","author":"N Hou","year":"2022","unstructured":"Hou, N., Xia, X., Zheng, Y.: CloakLoRa: a covert channel over LoRa PHY. IEEE\/ACM Trans. Netw. 31(3), 1159\u20131172 (2022). https:\/\/doi.org\/10.1109\/TNET.2022.3209255","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"11_CR24","doi-asserted-by":"publisher","unstructured":"Jia, W., Tso, F.P., Ling, Z., Fu, X., Xuan, D., Yu, W.: Blind detection of spread spectrum flow watermarks. In: IEEE INFOCOM 2009, pp. 2195\u20132203 (2009). https:\/\/doi.org\/10.1109\/INFCOM.2009.5062144","DOI":"10.1109\/INFCOM.2009.5062144"},{"key":"11_CR25","doi-asserted-by":"publisher","unstructured":"Katz, M., Matinmikko-Blue, M., Latva-Aho, M.: 6Genesis flagship program: building the bridges towards 6G-enabled wireless smart society and ecosystem. In: 2018 IEEE 10th Latin-American Conference on Communications (LATINCOM), pp. 1\u20139 (2018). https:\/\/doi.org\/10.1109\/LATINCOM.2018.8613209","DOI":"10.1109\/LATINCOM.2018.8613209"},{"issue":"3","key":"11_CR26","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MSPEC.2013.6471059","volume":"50","author":"D Kushner","year":"2013","unstructured":"Kushner, D.: The real story of stuxnet. IEEE Spectr. 50(3), 48\u201353 (2013). https:\/\/doi.org\/10.1109\/MSPEC.2013.6471059","journal-title":"IEEE Spectr."},{"issue":"10","key":"11_CR27","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"BW Lampson","year":"1973","unstructured":"Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613\u2013615 (1973). https:\/\/doi.org\/10.1145\/362375.362389","journal-title":"Commun. ACM"},{"key":"11_CR28","unstructured":"Lee, K.S., Wang, H., Weatherspoon, H.: PHY covert channels: can you see the idles? In: 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2014), pp. 173\u2013185. USENIX Association, Seattle (2014). https:\/\/www.usenix.org\/conference\/nsdi14\/technical-sessions\/presentation\/lee"},{"key":"11_CR29","doi-asserted-by":"publisher","unstructured":"Luo, X., Chan, E.W.W., Chang, R.K.C.: TCP covert timing channels: design and detection. In: 2008 IEEE International Conference on Dependable Systems and Networks with FTCS and DCC (DSN), pp. 420\u2013429 (2008). https:\/\/doi.org\/10.1109\/DSN.2008.4630112","DOI":"10.1109\/DSN.2008.4630112"},{"key":"11_CR30","doi-asserted-by":"publisher","unstructured":"Luo, X., Zhou, P., Zhang, J., Perdisci, R., Lee, W., Chang, R.K.C.: Exposing invisible timing-based traffic watermarks with backlit. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 197\u2013206. Association for Computing Machinery, New York (2011). https:\/\/doi.org\/10.1145\/2076732.2076760","DOI":"10.1145\/2076732.2076760"},{"key":"11_CR31","unstructured":"Massoud Salehi, P., Proakis, J.: Digital Communications, 5th edn. McGraw-Hill Education (2007). ISBN: 9780072957167"},{"issue":"2","key":"11_CR32","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/MSP.2015.33","volume":"13","author":"W Mazurczyk","year":"2015","unstructured":"Mazurczyk, W., Caviglione, L.: Information hiding as a challenge for malware detection. IEEE Secur. Priv. 13(2), 89\u201393 (2015). https:\/\/doi.org\/10.1109\/MSP.2015.33","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"11_CR33","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1007\/s11235-011-9617-y","volume":"52","author":"W Mazurczyk","year":"2013","unstructured":"Mazurczyk, W., Smolarczyk, M., Szczypiorski, K.: On information hiding in retransmissions. Telecommun. Syst. 52(2), 1113\u20131121 (2013). https:\/\/doi.org\/10.1007\/s11235-011-9617-y","journal-title":"Telecommun. Syst."},{"key":"11_CR34","doi-asserted-by":"publisher","unstructured":"Mazurczyk, W., Szczypiorski, K.: Steganography in handling oversized IP packets. In: 2009 International Conference on Multimedia Information Networking and Security, vol. 1, pp. 559\u2013564 (2009). https:\/\/doi.org\/10.1109\/MINES.2009.246","DOI":"10.1109\/MINES.2009.246"},{"key":"11_CR35","doi-asserted-by":"publisher","unstructured":"Mazurczyk, W., Szczypiorski, K.: Steganography in handling oversized IP packets, vol. 1, pp. 559\u2013564 (2009). https:\/\/doi.org\/10.1109\/MINES.2009.246","DOI":"10.1109\/MINES.2009.246"},{"issue":"1","key":"11_CR36","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/3158416","volume":"61","author":"W Mazurczyk","year":"2017","unstructured":"Mazurczyk, W., Wendzel, S.: Information hiding: challenges for forensic experts. Commun. ACM 61(1), 86\u201394 (2017). https:\/\/doi.org\/10.1145\/3158416","journal-title":"Commun. ACM"},{"key":"11_CR37","doi-asserted-by":"publisher","unstructured":"Ondov, A., Helebrandt, P.: Covert channel detection methods. In: 2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA), pp. 491\u2013496 (2022). https:\/\/doi.org\/10.1109\/ICETA57911.2022.9974878","DOI":"10.1109\/ICETA57911.2022.9974878"},{"key":"11_CR38","unstructured":"Ovadya, A., Ogen, R., Mallah, Y., Gilboa, N., Oren, Y.: Cross-router covert channels. In: Proceedings of the 13th USENIX Conference on Offensive Technologies, WOOT 2019, p. 2. USENIX Association (2019)"},{"key":"11_CR39","doi-asserted-by":"publisher","unstructured":"Soderi, S., Dainelli, G., Iinatti, J., H\u00e4m\u00e4l\u00e4inen, M.: Signal fingerprinting in cognitive wireless networks. In: 2014 9th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM), pp. 266\u2013270 (2014). https:\/\/doi.org\/10.4108\/icst.crowncom.2014.255374","DOI":"10.4108\/icst.crowncom.2014.255374"},{"key":"11_CR40","unstructured":"Strom, B.E., Applebaum, A., Miller, D.P., Nickels, K.C., Pennington, A.G., Thomas, C.B.: MITRE ATT &CK: design and philosophy. Technical report, The MITRE Corporation (2018)"},{"key":"11_CR41","doi-asserted-by":"publisher","unstructured":"Ussath, M., Jaeger, D., Cheng, F., Meinel, C.: Advanced persistent threats: behind the scenes. In: 2016 Annual Conference on Information Science and Systems (CISS), pp. 181\u2013186 (2016). https:\/\/doi.org\/10.1109\/CISS.2016.7460498","DOI":"10.1109\/CISS.2016.7460498"},{"issue":"3","key":"11_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2684195","volume":"47","author":"S Wendzel","year":"2015","unstructured":"Wendzel, S., Zander, S., Fechner, B., Herdin, C.: Pattern-based survey and categorization of network covert channel techniques. ACM Comput. Surv. 47(3), 1\u201326 (2015). https:\/\/doi.org\/10.1145\/2684195","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"11_CR43","doi-asserted-by":"publisher","first-page":"2665","DOI":"10.1109\/TDSC.2021.3068213","volume":"19","author":"X Ying","year":"2022","unstructured":"Ying, X., Bernieri, G., Conti, M., Bushnell, L., Poovendran, R.: Covert channel-based transmitter authentication in controller area networks. IEEE Trans. Dependable Secure Comput. 19(4), 2665\u20132679 (2022). https:\/\/doi.org\/10.1109\/TDSC.2021.3068213","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"11_CR44","unstructured":"Zhenyu, W., Zhang, X., Wang, H.: Whispers in the hyper-space: high-speed covert channel attacks in the cloud. In: USENIX Security Symposium, pp. 159\u2013173 (2012)"}],"container-title":["Communications in Computer and Information Science","Emerging Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-9614-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T15:04:21Z","timestamp":1704294261000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-9614-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819996131","9789819996148"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-9614-8_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"4 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Emerging Information Security and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eisa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eisa.compute.dtu.dk\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}