{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:58:00Z","timestamp":1767085080237,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,29]]},"DOI":"10.1145\/3600160.3605058","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T22:54:41Z","timestamp":1691621681000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A Survey of Steganography Tools at Layers 2-4 and HTTP"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7411-9678","authenticated-orcid":false,"given":"Stefano","family":"Bistarelli","sequence":"first","affiliation":[{"name":"Universita di Perugia, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7118-9856","authenticated-orcid":false,"given":"Michele","family":"Ceccarelli","sequence":"additional","affiliation":[{"name":"Universita degli Studi di Perugia, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6846-0922","authenticated-orcid":false,"given":"Chiara","family":"Luchini","sequence":"additional","affiliation":[{"name":"Dipartimento di Matematica e Informatica, Universita degli Studi di Perugia, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9774-1600","authenticated-orcid":false,"given":"Ivan","family":"Mercanti","sequence":"additional","affiliation":[{"name":"Universita degli Studi di Perugia, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3935-4696","authenticated-orcid":false,"given":"Francesco","family":"Santini","sequence":"additional","affiliation":[{"name":"Dipartimento di Matematica e Informatica, Dipartimento di Matematica e Informatica, Universita di Perugia, Italy, Italy"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSUDET.2013.6670985"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.04.194"},{"volume-title":"Un nuovo approccio alla steganografia di rete basato sugli header HTTP. Master\u2019s thesis","author":"Ceccarelli Michele","key":"e_1_3_2_1_3_1","unstructured":"Michele Ceccarelli. 2022. Un nuovo approccio alla steganografia di rete basato sugli header HTTP. Master\u2019s thesis. University of Perugia."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"daemon9. 1996. Project Loki. Phrack Magazine 49 (1996).","DOI":"10.1108\/09544789610114867"},{"key":"e_1_3_2_1_5_1","unstructured":"daemon9. 1997. Project Loki. Phrack Magazine 51 (1997)."},{"key":"e_1_3_2_1_6_1","volume-title":"11th USENIX Security Symposium (USENIX Security 02)","author":"Feamster Nick","year":"2002","unstructured":"Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, and David Karger. 2002. Infranet: Circumventing web censorship and surveillance. In 11th USENIX Security Symposium (USENIX Security 02)."},{"volume-title":"A MAC layer covert channel in 802.11 networks. Ph.\u00a0D. Dissertation","author":"Andr\u00e9\u00a0Santana Gon\u00e7alves Ricardo","key":"e_1_3_2_1_7_1","unstructured":"Ricardo Andr\u00e9\u00a0Santana Gon\u00e7alves. 2011. A MAC layer covert channel in 802.11 networks. Ph.\u00a0D. Dissertation. Monterey, California: Naval Postgraduate School."},{"key":"e_1_3_2_1_8_1","volume-title":"May","author":"Hauser Van","year":"1999","unstructured":"Van Hauser. 1999. Placing backdoors through firewalls. WindowsSecuriy.com, May (1999)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046730"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 6th Annual Postgraduate Symposium about the Convergence of Telecommunications, Networking and Broadcasting, PGNET, Vol.\u00a02005","author":"Llamas David","year":"2005","unstructured":"David Llamas, C Allison, and A Miller. 2005. Covert channels in internet protocols: A survey. In Proceedings of the 6th Annual Postgraduate Symposium about the Convergence of Telecommunications, Networking and Broadcasting, PGNET, Vol.\u00a02005."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158416"},{"key":"e_1_3_2_1_12_1","volume-title":"Information Hiding: First International Workshop Proceedings","author":"Pfitzmann Birgit","year":"1996","unstructured":"Birgit Pfitzmann. 1996. Information hiding terminology. In Information Hiding: First International Workshop Proceedings, 1996. Springer."},{"key":"e_1_3_2_1_13_1","volume-title":"Covert channel by abusing x509 extensions. viXra.org","author":"Reaves Jason","year":"2018","unstructured":"Jason Reaves. 2018. Covert channel by abusing x509 extensions. viXra.org (2018)."},{"volume-title":"2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech)","author":"Seo O","key":"e_1_3_2_1_14_1","unstructured":"Jun\u00a0O Seo, Sathiamoorthy Manoharan, and Aniket Mahanti. 2016. A discussion and review of network steganography. In 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech). IEEE, 384\u2013391."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SISW.2005.9"},{"key":"e_1_3_2_1_16_1","volume-title":"International journal of scientific research in science, engineering and technology 2","author":"Singh Harjit","year":"2016","unstructured":"Harjit Singh. 2016. Analysis of different types of steganography. International journal of scientific research in science, engineering and technology 2 (2016), 578\u2013582."},{"key":"e_1_3_2_1_17_1","volume-title":"Passing Time and Syncing Secrets: Demonstrating Covert Channel Vulnerabilities in Precision Time Protocol (PTP). Mathematics, Statistics, and Computer Science Honors Projects","author":"Smith-Donovan J","year":"2022","unstructured":"Aron\u00a0J Smith-Donovan. 2022. Passing Time and Syncing Secrets: Demonstrating Covert Channel Vulnerabilities in Precision Time Protocol (PTP). Mathematics, Statistics, and Computer Science Honors Projects (2022)."},{"key":"e_1_3_2_1_18_1","volume-title":"Steganography in TCP\/IP Networks. State of the Art and a Proposal of a New System-HICCUPS","author":"Szczypiorski Krzysztof","year":"2003","unstructured":"Krzysztof Szczypiorski. 2003. Steganography in TCP\/IP Networks. State of the Art and a Proposal of a New System-HICCUPS. Warsaw University of Technology, Poland Institute of Telecommunications, Warsaw, Poland (2003)."},{"key":"e_1_3_2_1_19_1","volume-title":"Butchered From Inside","author":"CK.","year":"2000","unstructured":"vecna. 2000. B0CK. Butchered From Inside (2000)."},{"key":"e_1_3_2_1_20_1","unstructured":"Arne Vidstrom. 2000. ACK Tunneling Trojans. (2000). Covert shell through TCP ACK."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.07.081"},{"key":"e_1_3_2_1_25_1","volume-title":"Reconnection-Based Covert Channels in Wireless Networks. In IFIP International Conference on ICT Systems Security and Privacy Protection. Springer, 118\u2013133","author":"Zillien Sebastian","year":"2021","unstructured":"Sebastian Zillien and Steffen Wendzel. 2021. Reconnection-Based Covert Channels in Wireless Networks. In IFIP International Conference on ICT Systems Security and Privacy Protection. Springer, 118\u2013133."}],"event":{"name":"ARES 2023: The 18th International Conference on Availability, Reliability and Security","acronym":"ARES 2023","location":"Benevento Italy"},"container-title":["Proceedings of the 18th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3605058","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600160.3605058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:16Z","timestamp":1750182556000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3605058"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":24,"alternative-id":["10.1145\/3600160.3605058","10.1145\/3600160"],"URL":"https:\/\/doi.org\/10.1145\/3600160.3605058","relation":{},"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"2023-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}