{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:20Z","timestamp":1750308800295,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,21]],"date-time":"2009-06-21T00:00:00Z","timestamp":1245542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,21]]},"DOI":"10.1145\/1582379.1582398","type":"proceedings-article","created":{"date-parts":[[2009,8,4]],"date-time":"2009-08-04T13:38:06Z","timestamp":1249393086000},"page":"79-83","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Using a secure permutational covert channel to detect local and wide area interposition attacks"],"prefix":"10.1145","author":[{"given":"Jaroslaw","family":"Paduch","sequence":"first","affiliation":[{"name":"John Jay College, CUNY, New York"}]},{"given":"Jamie","family":"Levy","sequence":"additional","affiliation":[{"name":"John Jay College, CUNY, New York"}]},{"given":"Bilal","family":"Khan","sequence":"additional","affiliation":[{"name":"John Jay College, CUNY, New York"}]}],"member":"320","published-online":{"date-parts":[[2009,6,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"L. Loeb \"On the lookout for dsniff: Part 1.\" {Online}. Available: http:\/\/www.ibm.com\/developerworks\/library\/s-sniff.html  L. Loeb \"On the lookout for dsniff: Part 1.\" {Online}. Available: http:\/\/www.ibm.com\/developerworks\/library\/s-sniff.html"},{"key":"e_1_3_2_1_2_1","volume-title":"No Starch Press","author":"Erickson J.","year":"2003","unstructured":"J. Erickson , Hacking : The Art of Exploitation , No Starch Press , First Edition , 2003 . J. Erickson, Hacking: The Art of Exploitation, No Starch Press, First Edition, 2003."},{"key":"e_1_3_2_1_3_1","unstructured":"P. Biondi \"Scapy.\" {Online}. Available: http:\/\/www.secdev.org\/projects\/scapy\/  P. Biondi \"Scapy.\" {Online}. Available: http:\/\/www.secdev.org\/projects\/scapy\/"},{"key":"e_1_3_2_1_4_1","unstructured":"M. V. Alberto Ornaghi \"Ettercap.\" {Online}. Available: http:\/\/ettercap.sourceforge.net\/  M. V. Alberto Ornaghi \"Ettercap.\" {Online}. Available: http:\/\/ettercap.sourceforge.net\/"},{"key":"e_1_3_2_1_5_1","unstructured":"R. Bejtlich \"Old school layer 2 hacking.\" {Online}. Available: http:\/\/taosecurity.blogspot.com\/2008\/06\/old-school-layer-2-hacking.html  R. Bejtlich \"Old school layer 2 hacking.\" {Online}. Available: http:\/\/taosecurity.blogspot.com\/2008\/06\/old-school-layer-2-hacking.html"},{"key":"e_1_3_2_1_6_1","unstructured":"H. D. Moore \"Full disclosure: Re: Metasploit - hack ?\" {Online}. Available: http:\/\/seclists.org\/fulldisclosure\/2008\/Jun\/0011.html  H. D. Moore \"Full disclosure: Re: Metasploit - hack ?\" {Online}. Available: http:\/\/seclists.org\/fulldisclosure\/2008\/Jun\/0011.html"},{"key":"e_1_3_2_1_7_1","unstructured":"H. D. Moore \"Full disclosure: Re: Metasploit - hack ? (analysis).\" {Online}. Available: http:\/\/seclists.org\/fulldisclosure\/2008\/Jun\/0013.html  H. D. Moore \"Full disclosure: Re: Metasploit - hack ? (analysis).\" {Online}. Available: http:\/\/seclists.org\/fulldisclosure\/2008\/Jun\/0013.html"},{"key":"e_1_3_2_1_8_1","unstructured":"D. Song \"Dsniff faq.\" {Online}. Available: http:\/\/monkey.org\/~dugsong\/dsniff\/faq.html#How%20do%20I%20detect%20dsniff%20on%20my%20network  D. Song \"Dsniff faq.\" {Online}. Available: http:\/\/monkey.org\/~dugsong\/dsniff\/faq.html#How%20do%20I%20detect%20dsniff%20on%20my%20network"},{"key":"e_1_3_2_1_9_1","unstructured":"unknown \"anti-arp.\" {Online}. Available: http:\/\/sync-io.net\/Sec\/anti-arpspoof.aspx  unknown \"anti-arp.\" {Online}. Available: http:\/\/sync-io.net\/Sec\/anti-arpspoof.aspx"},{"key":"e_1_3_2_1_10_1","unstructured":"K. Levinson \"comp.security.misc: Re: Defending arp spoofing.\" {Online}. Available: http:\/\/www.derkeiler.com\/Newsgroups\/comp.os.ms-windows.nt.admin.security\/2005 -11\/0004.html  K. Levinson \"comp.security.misc: Re: Defending arp spoofing.\" {Online}. Available: http:\/\/www.derkeiler.com\/Newsgroups\/comp.os.ms-windows.nt.admin.security\/2005 -11\/0004.html"},{"key":"e_1_3_2_1_11_1","unstructured":"L. N. R. Group \"Arpwatch.\" {Online}. Available: http:\/\/ee.lbl.gov\/  L. N. R. Group \"Arpwatch.\" {Online}. Available: http:\/\/ee.lbl.gov\/"},{"key":"e_1_3_2_1_12_1","unstructured":"I. Cisco Systems \"Catalyst 4500 series switch cisco ios software configuration guide 12.1(13)ew.\" {Online}. Available: http:\/\/www.cisco.com\/en\/US\/docs\/switches\/lan\/catalyst4500\/12.1\/13ew\/configura tion\/guide\/pref.html  I. Cisco Systems \"Catalyst 4500 series switch cisco ios software configuration guide 12.1(13)ew.\" {Online}. Available: http:\/\/www.cisco.com\/en\/US\/docs\/switches\/lan\/catalyst4500\/12.1\/13ew\/configura tion\/guide\/pref.html"},{"key":"e_1_3_2_1_13_1","unstructured":"A. D. Pasquale \"Arpon.\" {Online}. Available: http:\/\/arpon.sourceforge.net\/  A. D. Pasquale \"Arpon.\" {Online}. Available: http:\/\/arpon.sourceforge.net\/"},{"key":"e_1_3_2_1_14_1","unstructured":"R. McMillan \"Dns attack writer a victim of his own creation.\" {Online}. Available: http:\/\/www.pcworld.com\/businesscenter\/article\/149126\/dns_attack_writer_a_vict_im_of_his_own_creation.html  R. McMillan \"Dns attack writer a victim of his own creation.\" {Online}. Available: http:\/\/www.pcworld.com\/businesscenter\/article\/149126\/dns_attack_writer_a_vict_im_of_his_own_creation.html"},{"key":"e_1_3_2_1_15_1","unstructured":"R. Naraine \"Websense reports china netcom dns cache poisoning.\" {Online}. Available: http:\/\/blogs.zdnet.com\/security\/?p=1776  R. Naraine \"Websense reports china netcom dns cache poisoning.\" {Online}. Available: http:\/\/blogs.zdnet.com\/security\/?p=1776"},{"key":"e_1_3_2_1_16_1","unstructured":"K. Poulsen \"Comcast hijackers say they warned the company first.\" {Online}. Available: http:\/\/blog.wired.com\/27bstroke6\/2008\/05\/comcast-hijacke.html  K. Poulsen \"Comcast hijackers say they warned the company first.\" {Online}. Available: http:\/\/blog.wired.com\/27bstroke6\/2008\/05\/comcast-hijacke.html"},{"key":"e_1_3_2_1_17_1","unstructured":"C. Vulnerabilities and Exposures \"Cve-2008-1447.\" {Online}. Available: http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2008-1447  C. Vulnerabilities and Exposures \"Cve-2008-1447.\" {Online}. Available: http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2008-1447"},{"key":"e_1_3_2_1_18_1","unstructured":"D. Kaminsky \"Black ops 2008: It&amp;#226;&amp;#258;&amp;Zacute;s the end of the cache as we know it.\" {Online}. Available: http::\/\/www.doxpara.com\/DMK_BO2K8.ppt  D. Kaminsky \"Black ops 2008: It&amp;#226;&amp;#258;&amp;Zacute;s the end of the cache as we know it.\" {Online}. Available: http::\/\/www.doxpara.com\/DMK_BO2K8.ppt"},{"key":"e_1_3_2_1_19_1","unstructured":"R. Bejtlich \"Thoughts on latest kaminsky dns issue.\" {Online}. Available: http:\/\/taosecurity.blogspot.com\/2008\/07\/thoughts-on-latest-kaminski-dns-issue.html  R. Bejtlich \"Thoughts on latest kaminsky dns issue.\" {Online}. Available: http:\/\/taosecurity.blogspot.com\/2008\/07\/thoughts-on-latest-kaminski-dns-issue.html"},{"key":"e_1_3_2_1_20_1","unstructured":"S. Friedl \"An illustrated guide to the kaminsky dns vulnerability.\" {Online}. Available: http:\/\/www.unixwiz.net\/techtips\/iguide-kaminsky-dnsvuln.html  S. Friedl \"An illustrated guide to the kaminsky dns vulnerability.\" {Online}. Available: http:\/\/www.unixwiz.net\/techtips\/iguide-kaminsky-dnsvuln.html"},{"key":"e_1_3_2_1_21_1","unstructured":"H. Moore and I)ruid \"Kaminsky dns cache poisoning exploit for metasploit.\" {Online}. Available: http:\/\/www.caughq.org\/exploits\/CAU-EX-2008-0002.txt  H. Moore and I)ruid \"Kaminsky dns cache poisoning exploit for metasploit.\" {Online}. Available: http:\/\/www.caughq.org\/exploits\/CAU-EX-2008-0002.txt"},{"key":"e_1_3_2_1_22_1","unstructured":"Microsoft \"Microsoft security bulletin ms08-037.\" {Online}. Available: http:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS08-037.mspx  Microsoft \"Microsoft security bulletin ms08-037.\" {Online}. Available: http:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS08-037.mspx"},{"key":"e_1_3_2_1_23_1","unstructured":"\"Opendns.\" {Online}. Available: http:\/\/www.opendns.com\/  \"Opendns.\" {Online}. Available: http:\/\/www.opendns.com\/"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52356"},{"key":"e_1_3_2_1_25_1","volume-title":"Alexandria VA","author":"Levy J.","year":"2008","unstructured":"J. Levy , J. Paduch , and B. Khan , \" Superimposing permutational covert channels onto reliable stream protocols,\" in Proceedings of MALWARE 2008 , Alexandria VA , Oct. 2008 . J. Levy, J. Paduch, and B. Khan, \"Superimposing permutational covert channels onto reliable stream protocols,\" in Proceedings of MALWARE 2008, Alexandria VA, Oct. 2008."}],"event":{"name":"IWCMC '09: 2009 International Wireless Communications and Mobile Computing Conference","sponsor":["ACM Association for Computing Machinery","Wiley-Blackwell","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGDOC ACM Special Interest Group for Design of Communications"],"location":"Leipzig Germany","acronym":"IWCMC '09"},"container-title":["Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1582379.1582398","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1582379.1582398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:25:57Z","timestamp":1750278357000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1582379.1582398"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,21]]},"references-count":25,"alternative-id":["10.1145\/1582379.1582398","10.1145\/1582379"],"URL":"https:\/\/doi.org\/10.1145\/1582379.1582398","relation":{},"subject":[],"published":{"date-parts":[[2009,6,21]]},"assertion":[{"value":"2009-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}