{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T11:21:03Z","timestamp":1771845663562,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["786922, 833042, 833456"],"award-info":[{"award-number":["786922, 833042, 833456"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,17]]},"DOI":"10.1145\/3465481.3470028","type":"proceedings-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T18:07:25Z","timestamp":1629137245000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["bccstego: A Framework for Investigating Network Covert Channels"],"prefix":"10.1145","author":[{"given":"Matteo","family":"Repetto","sequence":"first","affiliation":[{"name":"Institute for Applied Mathematics and Information Technologies, IT"}]},{"given":"Luca","family":"Caviglione","sequence":"additional","affiliation":[{"name":"Institute for Applied Mathematics and Information Technologies, IT"}]},{"given":"Marco","family":"Zuppelli","sequence":"additional","affiliation":[{"name":"Institute for Applied Mathematics and Information Technologies, IT"}]}],"member":"320","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. DPDK Programmer\u2019s Guide. Technical Documentation. https:\/\/doc.dpdk.org\/guides\/prog_guide\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1800069"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47560-8_6"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2018.032501746"},{"key":"e_1_3_2_1_5_1","volume-title":"Programmable Data Gathering for Detecting Stegomalware. In 6th IEEE Conference on Network Softwarization (NetSoft)","author":"Carrega Alessandro","year":"2020","unstructured":"Alessandro Carrega, Luca Caviglione, Matteo Repetto, and Marco Zuppelli. 2020. Programmable Data Gathering for Detecting Stegomalware. In 6th IEEE Conference on Network Softwarization (NetSoft). Ghent, Belgium."},{"key":"e_1_3_2_1_6_1","volume-title":"Trends and Challenges in Network Covert Channels Countermeasures. Applied Sciences 11, 4","author":"Caviglione Luca","year":"2021","unstructured":"Luca Caviglione. 2021. Trends and Challenges in Network Covert Channels Countermeasures. Applied Sciences 11, 4 (2021)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3048319"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108010"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of SANE","author":"Deri Luca","year":"2004","unstructured":"Luca Deri. 2004. Improving passive packet capture: Beyond device polling. In Proceedings of SANE 2004. Amsterdam, The Netherlands, 85\u201393."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015495"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_1_13_1","volume-title":"Int. Workshop on Information Hiding. Springer, 58\u201377","author":"Lewandowski G.","unstructured":"G. Lewandowski, N. Lucena, and S. Chapin. 2006. Analyzing Network-aware Active Wardens in IPv6. In Int. Workshop on Information Hiding. Springer, 58\u201377."},{"key":"e_1_3_2_1_14_1","volume-title":"Int. Workshop on Privacy Enhancing Technologies. Springer, 147\u2013166","author":"Lucena N.","unstructured":"N. Lucena, G. Lewandowski, and S. Chapin. 2005. Covert Channels in IPv6. In Int. Workshop on Privacy Enhancing Technologies. Springer, 147\u2013166."},{"key":"e_1_3_2_1_15_1","volume-title":"Evaluation of virtualization and traffic filtering methods for container networks. Future Generation Computer Systems 93 (April","author":"Makowski Lukasz","year":"2019","unstructured":"Lukasz Makowski and Paola Grosso. 2019. Evaluation of virtualization and traffic filtering methods for container networks. Future Generation Computer Systems 93 (April 2019), 345\u2013357."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2350994"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.33"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360664.3360674"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2015.7387411"},{"key":"e_1_3_2_1_20_1","unstructured":"Steve Pope and David Riddoch. 2011. Introduction to OpenOnload\u2014Building Application Transparency and Protocol Conformance into Application Acceleration Middleware. Whitepaper. http:\/\/www.moderntech.com.hk\/sites\/default\/files\/whitepaper\/SF-105918-CD-1_Introduction_to_OpenOnload_White_Paper.pdf"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"M. Repetto A. Carrega and R. Rapuzzi. 2021. An architecture to manage security operations for digital service chains. Future Generation Computer Systems 115 (February 2021) 251\u2013266.","DOI":"10.1016\/j.future.2020.08.044"},{"key":"e_1_3_2_1_22_1","volume-title":"2012 USENIX Annual Technical Conference (USENIX ATC 12)","author":"Rizzo Luigi","year":"2012","unstructured":"Luigi Rizzo. 2012. netmap: A Novel Framework for Fast Packet I\/O. In 2012 USENIX Annual Technical Conference (USENIX ATC 12). Boston, MA, 101\u2013112."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684195"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"}],"event":{"name":"ARES 2021: The 16th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2021"},"container-title":["Proceedings of the 16th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3470028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3465481.3470028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:24Z","timestamp":1750191444000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3470028"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":23,"alternative-id":["10.1145\/3465481.3470028","10.1145\/3465481"],"URL":"https:\/\/doi.org\/10.1145\/3465481.3470028","relation":{},"subject":[],"published":{"date-parts":[[2021,8,17]]},"assertion":[{"value":"2021-08-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}