{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:01:17Z","timestamp":1773615677382,"version":"3.50.1"},"reference-count":16,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625700853","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:34:10Z","timestamp":1771936450000},"page":"1315-1321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Memory-Based Covert Channels in the TLS Protocol"],"prefix":"10.3103","volume":"59","author":[{"given":"M. A.","family":"Finoshin","sequence":"first","affiliation":[]},{"given":"I. D.","family":"Ivanova","sequence":"additional","affiliation":[]},{"given":"I. Yu.","family":"Zhukov","sequence":"additional","affiliation":[]},{"given":"A. V.","family":"Zuikov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7920_CR1","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B.W. Lampson","year":"1973","unstructured":"Lampson, B.W., A note on the confinement problem, Commun. ACM, 1973, vol. 16, no. 10, pp. 613\u2013615. https:\/\/doi.org\/10.1145\/362375.362389","journal-title":"Commun. ACM"},{"key":"7920_CR2","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/comst.2007.4317620","volume":"9","author":"S. Zander","year":"2007","unstructured":"Zander, S., Armitage, G., and Branch, P., A survey of covert channels and countermeasures in computer network protocols, IEEE Commun. Surv. Tutorials, 2007, vol. 9, no. 3, pp. 44\u201357. https:\/\/doi.org\/10.1109\/comst.2007.4317620","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"7920_CR3","unstructured":"Crockett, E., Paquin, C., and Stebila, D., Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH, Cryptology ePrint Archive, 2019."},{"key":"7920_CR4","doi-asserted-by":"publisher","first-page":"22","DOI":"10.22667\/JOWUA.2021.12.31.022","volume":"12","author":"C. Heinz","year":"2021","unstructured":"Heinz, C., Zuppelli, M., and Caviglione, L., Covert channels in transport layer security: Performance and security assessment, Journal of Wireless Mobile Networks, 2021, vol. 12, no. 4, pp. 22\u201336. https:\/\/doi.org\/10.22667\/JOWUA.2021.12.31.022","journal-title":"Journal of Wireless Mobile Networks"},{"key":"7920_CR5","doi-asserted-by":"publisher","unstructured":"Handel, T.G. and Sandford, M.T., Hiding data in the OSI network model, Information Hiding, Anderson, R., Ed., Lecture Notes in Computer Science, vol. 1174, Berlin: Springer, 1996, pp. 23\u201338. https:\/\/doi.org\/10.1007\/3-540-61996-8_29","DOI":"10.1007\/3-540-61996-8_29"},{"key":"7920_CR6","doi-asserted-by":"publisher","unstructured":"Rowland, C.H., Covert channels in the TCP\/IP protocol suite, First Monday, 1997, vol. 2, no. 5. https:\/\/doi.org\/10.5210\/fm.v2i5.528","DOI":"10.5210\/fm.v2i5.528"},{"key":"7920_CR7","doi-asserted-by":"publisher","unstructured":"Cauich, E., G\u00f3mez C\u00e1rdenas, R., and Watanabe, R., Data hiding in identification and offset IP fields, Advanced Distributed Systems. ISSADS 2005, Ramos, F.F., Larios Rosillo, V., and Unger, H., Eds., Lecture Notes in Computer Science, vol. 3563, Berlin: Springer, 2005, pp. 118\u2013125. https:\/\/doi.org\/10.1007\/11533962_11","DOI":"10.1007\/11533962_11"},{"key":"7920_CR8","doi-asserted-by":"publisher","unstructured":"Murdoch, S.J. and Lewis, S., Embedding covert channels into TCP\/IP, Information Hiding, Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., and P\u00e9rez-Gonz\u00e1lez, F., Eds., Lecture Notes in Computer Science, vol. 3727, Berlin: Springer, 2005, pp. 247\u2013261. https:\/\/doi.org\/10.1007\/11558859_19","DOI":"10.1007\/11558859_19"},{"key":"7920_CR9","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/3546933","volume":"20","author":"J.P. Hughes","year":"2022","unstructured":"Hughes, J.P. and Diffie, W., The challenges of IoT, TLS, and random number generators in the real world: Bad random numbers are still with us and are proliferating in modern systems, Queue, 2022, vol. 20, no. 3, pp. 18\u201340. https:\/\/doi.org\/10.1145\/3546933","journal-title":"Queue"},{"key":"7920_CR10","unstructured":"Matveev, S.V., Methods of protection from the covert channels in the automated systems and their channel capacity at some modes of opposition, Doklady Tomskogo Gosudarstvennogo Universiteta Sistem Upravleniya i Radioelektroniki, 2012, no. 1, pp. 74\u201377."},{"key":"7920_CR11","first-page":"94","volume":"20","author":"S.V. Kachalkova","year":"2017","unstructured":"Kachalkova, S.V., Rybushkin, N.A., and Miftakhova, L.Kh., Vulnerability analysis and search for solutions for IPv6 security organization, Vestn. Kazan. \n               Tekhnol. Univ., 2017, vol. 20, no. 15, pp. 94\u2013100.","journal-title":"Tekhnol. Univ."},{"key":"7920_CR12","doi-asserted-by":"publisher","first-page":"2254959","DOI":"10.1155\/2022\/2254959","volume":"2022","author":"F. Iglesias","year":"2022","unstructured":"Iglesias, F., Meghdouri, F., Annessi, R., and Zseby, T., CCgen: Injecting covert channels into network traffic, Security and Communication Networks, 2022, vol. 2022, p. 2254959. https:\/\/doi.org\/10.1155\/2022\/2254959","journal-title":"Security and Communication Networks"},{"key":"7920_CR13","doi-asserted-by":"publisher","unstructured":"Levy, J., Paduch, J., and Khan, B., Superimposing permutational covert channels onto reliable stream protocols, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), Alexandria, VA, 2008, IEEE, 2008, pp. 49\u201356. https:\/\/doi.org\/10.1109\/malware.2008.4690857","DOI":"10.1109\/malware.2008.4690857"},{"key":"7920_CR14","doi-asserted-by":"publisher","unstructured":"Hammouda, S., Maalej, L., and Trabelsi, Z., Towards optimized TCP\/IP covert channels detection, IDS and firewall integration, 2008 New Technologies, Mobility and Security, Tangier, Morocco, 2008, IEEE, 2008, p. 15. https:\/\/doi.org\/10.1109\/ntms.2008.ecp.101","DOI":"10.1109\/ntms.2008.ecp.101"},{"key":"7920_CR15","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/2684195","volume":"47","author":"S. Wendzel","year":"2015","unstructured":"Wendzel, S., Zander, S., Fechner, B., and Herdin, Ch., Pattern-based survey and categorization of network covert channel techniques, ACM Comput. Surv., 2015, vol. 47, no. 3, p. 50. https:\/\/doi.org\/10.1145\/2684195","journal-title":"ACM Comput. Surv."},{"key":"7920_CR16","doi-asserted-by":"publisher","first-page":"100975","DOI":"10.1016\/j.softx.2022.100975","volume":"17","author":"L. Caviglione","year":"2022","unstructured":"Caviglione, L., Schaffhauser, A., Zuppelli, M., and Mazurczyk, W., IPv6CC: IPv6 covert channels for testing networks against stegomalware and data exfiltration, SoftwareX, 2022, vol. 17, p. 100975. https:\/\/doi.org\/10.1016\/j.softx.2022.100975","journal-title":"SoftwareX"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700853.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700853","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700853.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:12Z","timestamp":1773612192000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":16,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7920"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700853","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"28 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}