{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T14:49:00Z","timestamp":1777128540991,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T00:00:00Z","timestamp":1636502400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union from the European Regional Development Fund (ERDF) and the State of Rhineland-Palatinate (MWG), Germany","award":["84003751"],"award-info":[{"award-number":["84003751"]}]},{"name":"MWG of the State of Rhineland-Palatinate under the HAW-Corona-KI programme","award":["project KISAT"],"award-info":[{"award-number":["project KISAT"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,10]]},"DOI":"10.1145\/3487405.3487660","type":"proceedings-article","created":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T18:04:33Z","timestamp":1637604273000},"page":"66-71","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Reset- and Reconnection-based Covert Channels in CoAP"],"prefix":"10.1145","author":[{"given":"Laura","family":"Hartmann","sequence":"first","affiliation":[{"name":"Worms University of Applied Sciences, Germany and FernUniversit\u00e4t in Hagen, Germany"}]},{"given":"Sebastian","family":"Zillien","sequence":"additional","affiliation":[{"name":"Worms University of Applied Sciences, Germany"}]},{"given":"Steffen","family":"Wendzel","sequence":"additional","affiliation":[{"name":"Worms University of Applied Sciences, Germany and FernUniversit\u00e4t in Hagen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","author":"Bormann Carsten","year":"2016","unstructured":"Carsten Bormann . 2016 . CoAP - RFC 7252 Constrained Application Protocol. Technologie-Zentrum Informatik und Informationstechnik (Universit\u00e4t Bremen) . Retrieved September 26, 2021 from https:\/\/coap.technology\/ Carsten Bormann. 2016. CoAP - RFC 7252 Constrained Application Protocol. Technologie-Zentrum Informatik und Informationstechnik (Universit\u00e4t Bremen). Retrieved September 26, 2021 from https:\/\/coap.technology\/"},{"key":"#cr-split#-e_1_3_2_1_2_1.1","doi-asserted-by":"crossref","unstructured":"Luca Caviglione. 2021. Trends and Challenges in Network Covert Channels Countermeasures. Appl. Sci. 11(2021). https:\/\/doi.org\/10.3390\/app11041641 10.3390\/app11041641","DOI":"10.3390\/app11041641"},{"key":"#cr-split#-e_1_3_2_1_2_1.2","doi-asserted-by":"crossref","unstructured":"Luca Caviglione. 2021. Trends and Challenges in Network Covert Channels Countermeasures. Appl. Sci. 11(2021). https:\/\/doi.org\/10.3390\/app11041641","DOI":"10.3390\/app11041641"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"S. Floyd. 2002. Inappropriate TCP Resets Considered Harmful. RFC 3360.  S. Floyd. 2002. Inappropriate TCP Resets Considered Harmful. RFC 3360.","DOI":"10.17487\/rfc3360"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487405.3487662"},{"key":"e_1_3_2_1_5_1","unstructured":"Mario Hildebrandt Robert Altschaffel Kevin Lamsh\u00f6ft Mathias Lange Yongjian Ding Claus Vielhauer and Jana Dittmann. 2020. Threat Analysis of Steganographic and Covert Communication in Nuclear I&C Systems.  Mario Hildebrandt Robert Altschaffel Kevin Lamsh\u00f6ft Mathias Lange Yongjian Ding Claus Vielhauer and Jana Dittmann. 2020. Threat Analysis of Steganographic and Covert Communication in Nuclear I&C Systems."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0Uroz Hinarejos. 2020. Data Exfiltration in IoT Protocols. Master\u2019s thesis. Universidad de Le\u00f3n Spain.  Daniel\u00a0Uroz Hinarejos. 2020. Data Exfiltration in IoT Protocols. Master\u2019s thesis. Universidad de Le\u00f3n Spain.","DOI":"10.26754\/jjii3a.4977"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2014.10.003"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Kevin Lamsh\u00f6ft Tom Neubert Christian Kraetzer Claus Vielhauer and Jana Dittmann. 2021. Information Hiding in Cyber Physical Systems: Challenges for Embedding Retrieval and Detection using Sensor Data of the SWAT Dataset. 113\u2013124.  Kevin Lamsh\u00f6ft Tom Neubert Christian Kraetzer Claus Vielhauer and Jana Dittmann. 2021. Information Hiding in Cyber Physical Systems: Challenges for Embedding Retrieval and Detection using Sensor Data of the SWAT Dataset. 113\u2013124.","DOI":"10.1145\/3437880.3460413"},{"key":"e_1_3_2_1_10_1","volume-title":"claus Vielhauer, and Jana Dittmann","author":"Lamsh\u00f6ft Kevin","year":"2020","unstructured":"Kevin Lamsh\u00f6ft , Tom Neubert , Mathias Lange , Robert Altschaffel , Mario Hildebrandt , Yongjian Ding , claus Vielhauer, and Jana Dittmann . 2020 . Novel Challenges for Anomaly Detection in I&C Networks : Strategic Preparation for the Advent of Information Hiding based Attacks. Atw. Atomwirtschaft 65 (10 2020), 504\u2013508. Kevin Lamsh\u00f6ft, Tom Neubert, Mathias Lange, Robert Altschaffel, Mario Hildebrandt, Yongjian Ding, claus Vielhauer, and Jana Dittmann. 2020. Novel Challenges for Anomaly Detection in I&C Networks: Strategic Preparation for the Advent of Information Hiding based Attacks. Atw. Atomwirtschaft 65 (10 2020), 504\u2013508."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102207"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 12th International Conference on Emerging Security Information, Systems and Technologies","author":"Mileva Aleksandra","year":"2018","unstructured":"Aleksandra Mileva , Aleksandar Velinov , and Done Stojanov . 2018 . New Covert Channels in Internet of Things . In Proceedings of the 12th International Conference on Emerging Security Information, Systems and Technologies ( Venice, Italy) (SECURWARE 2018). International Academy, Research, and Industry Association (IARIA), Wilmington, Delaware, USA, 30\u201336\u00a0pages. Aleksandra Mileva, Aleksandar Velinov, and Done Stojanov. 2018. New Covert Channels in Internet of Things. In Proceedings of the 12th International Conference on Emerging Security Information, Systems and Technologies (Venice, Italy) (SECURWARE 2018). International Academy, Research, and Industry Association (IARIA), Wilmington, Delaware, USA, 30\u201336\u00a0pages."},{"key":"e_1_3_2_1_13_1","volume-title":"Retrieved","author":"Shelby Zach","year":"2014","unstructured":"Zach Shelby , Klaus Hartke , and Carsten Bormann . 2014 . The Constrained Application Protocol (CoAP). Technologie-Zentrum Informatik und Informationstechnik (Universit\u00e4t Bremen) . Retrieved September 26, 2021 from https:\/\/tools.ietf.org\/html\/rfc7252 Zach Shelby, Klaus Hartke, and Carsten Bormann. 2014. The Constrained Application Protocol (CoAP). Technologie-Zentrum Informatik und Informationstechnik (Universit\u00e4t Bremen). Retrieved September 26, 2021 from https:\/\/tools.ietf.org\/html\/rfc7252"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108079"},{"key":"e_1_3_2_1_15_1","first-page":"2","article-title":"Power Consumption Analysis of the New Covert Channels in CoAP","volume":"12","author":"Velinov Aleksandar","year":"2019","unstructured":"Aleksandar Velinov , Aleksandra Mileva , and Done Stojanov . 2019 . Power Consumption Analysis of the New Covert Channels in CoAP . International Journal on Advances in Security 12 , 1 & 2 (August 2019), 42\u201352. Aleksandar Velinov, Aleksandra Mileva, and Done Stojanov. 2019. Power Consumption Analysis of the New Covert Channels in CoAP. International Journal on Advances in Security 12, 1 & 2 (August 2019), 42\u201352.","journal-title":"International Journal on Advances in Security"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2951425"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470069"},{"key":"e_1_3_2_1_18_1","volume-title":"Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet. In 2012 IEEE International Conference on Green Computing and Communications","author":"Wendzel Steffen","unstructured":"Steffen Wendzel , Benjamin Kahler , and Thomas Rist . 2012. Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet. In 2012 IEEE International Conference on Green Computing and Communications . IEEE Computer Society , Washington, DC, USA , 731\u2013736. Steffen Wendzel, Benjamin Kahler, and Thomas Rist. 2012. Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet. In 2012 IEEE International Conference on Green Computing and Communications. IEEE Computer Society, Washington, DC, USA, 731\u2013736."},{"key":"e_1_3_2_1_19_1","first-page":"11","article-title":"Unified Description for Network Information Hiding Methods","volume":"22","author":"Wendzel Steffen","year":"2016","unstructured":"Steffen Wendzel , Wojciech Mazurczyk , and Sebastian Zander . 2016 . Unified Description for Network Information Hiding Methods . Journal of Universal Computer Science 22 , 11 (November 2016), 1456\u20131486. Steffen Wendzel, Wojciech Mazurczyk, and Sebastian Zander. 2016. Unified Description for Network Information Hiding Methods. Journal of Universal Computer Science 22, 11 (November 2016), 1456\u20131486.","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684195"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"e_1_3_2_1_22_1","volume-title":"Reconnection-based Covert Channels in Wireless Networks. In 36th International Conference on ICT Systems Security and Privacy Protection","author":"Zillien Sebastian","year":"2021","unstructured":"Sebastian Zillien and Steffen Wendzel . 2021 . Reconnection-based Covert Channels in Wireless Networks. In 36th International Conference on ICT Systems Security and Privacy Protection ( Oslo, Norway) (IFIPSEC 2021), Audun J\u00f8sang, Lynn Futcher, and Janne Hagen (Eds.). Springer International Publishing, Cham, 118-133\u00a0pages. Sebastian Zillien and Steffen Wendzel. 2021. Reconnection-based Covert Channels in Wireless Networks. In 36th International Conference on ICT Systems Security and Privacy Protection (Oslo, Norway) (IFIPSEC 2021), Audun J\u00f8sang, Lynn Futcher, and Janne Hagen (Eds.). Springer International Publishing, Cham, 118-133\u00a0pages."}],"event":{"name":"EICC '21: European Interdisciplinary Cybersecurity Conference","location":"Virtual Event Romania","acronym":"EICC '21"},"container-title":["European Interdisciplinary Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487405.3487660","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487405.3487660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:50Z","timestamp":1750188650000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487405.3487660"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,10]]},"references-count":23,"alternative-id":["10.1145\/3487405.3487660","10.1145\/3487405"],"URL":"https:\/\/doi.org\/10.1145\/3487405.3487660","relation":{},"subject":[],"published":{"date-parts":[[2021,11,10]]},"assertion":[{"value":"2021-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}