{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:09:36Z","timestamp":1772726976690,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T00:00:00Z","timestamp":1605657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Comission","award":["SIMARGL project no 833042"],"award-info":[{"award-number":["SIMARGL project no 833042"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,18]]},"DOI":"10.1145\/3424954.3424962","type":"proceedings-article","created":{"date-parts":[[2021,1,12]],"date-time":"2021-01-12T19:47:00Z","timestamp":1610480820000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Covert Channels in Transport Layer Security"],"prefix":"10.1145","author":[{"given":"Corinna","family":"Heinz","sequence":"first","affiliation":[{"name":"FernUniversit\u00e4t in Hagen, Hagen, Germany"}]},{"given":"Wojciech","family":"Mazurczyk","sequence":"additional","affiliation":[{"name":"Warsaw University of Technology, Warsaw, Poland"}]},{"given":"Luca","family":"Caviglione","sequence":"additional","affiliation":[{"name":"National Research Council of Italy, Genova, Italy"}]}],"member":"320","published-online":{"date-parts":[[2021,1,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"V. Berk A. Giani and G. Cybenko. 2005. Detection of covert channel encoding in network packet delays. Technical report TR536 TU Dartmouth 19 (2005).  V. Berk A. Giani and G. Cybenko. 2005. Detection of covert channel encoding in network packet delays. Technical report TR536 TU Dartmouth 19 (2005)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2018.032501746"},{"key":"e_1_3_2_1_3_1","volume-title":"Programmable Data Gathering for Detecting Stegomalware. In 2020 6th IEEE Conference on Network Softwarization (NetSoft). IEEE, 422--429","author":"Carrega Alessandro","year":"2020"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSC.2009.5286305"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600955"},{"key":"e_1_3_2_1_6_1","first-page":"858","article-title":"Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH","volume":"2019","author":"Crockett E.","year":"2019","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"T. Dierks and E. Rescorla. 2008. RFC 5246-the transport layer security (TLS) protocol version 1.2. The Internet Engineering Task Force (IETF) (2008).  T. Dierks and E. Rescorla. 2008. RFC 5246-the transport layer security (TLS) protocol version 1.2. The Internet Engineering Task Force (IETF) (2008).","DOI":"10.17487\/rfc5246"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"D. Eastlake et al. 2011. Transport layer security (TLS) extensions: Extension definitions. Technical Report. RFC 6066 January.  D. Eastlake et al. 2011. Transport layer security (TLS) extensions: Extension definitions. Technical Report. RFC 6066 January.","DOI":"10.17487\/rfc6066"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.08.009"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"R. Holz J. Amann O. Mehani M. Wachs and M. Kaafar. 2015. TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication. arXiv preprint arXiv:1511.00341 (2015).  R. Holz J. Amann O. Mehani M. Wachs and M. Kaafar. 2015. TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication. arXiv preprint arXiv:1511.00341 (2015).","DOI":"10.14722\/ndss.2016.23055"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2604405"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1471"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2543581.2543587"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2350994"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.33"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of the Conference on Security and Management. 70--72","author":"Merrill J."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.03.004"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.04.032"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.08.006"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2951425"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-016-5089-2"}],"event":{"name":"EICC 2020: European Interdisciplinary Cybersecurity Conference","location":"Rennes France","acronym":"EICC 2020"},"container-title":["Proceedings of the European Interdisciplinary Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424954.3424962","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3424954.3424962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:09Z","timestamp":1750197729000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424954.3424962"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,18]]},"references-count":22,"alternative-id":["10.1145\/3424954.3424962","10.1145\/3424954"],"URL":"https:\/\/doi.org\/10.1145\/3424954.3424962","relation":{},"subject":[],"published":{"date-parts":[[2020,11,18]]},"assertion":[{"value":"2021-01-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}