[1] Lampson B W. A note on the confinement problem[J]. Communications of the ACM, 1973,16(10):613-615.
[2] 王永吉,吴敬征,曾海涛,等. 隐蔽信道研究[J]. 软件学报, 2010,21(9):2262-2288.
[3] 丁志明. 基于模型拟合和模糊聚类的时间式网络隐蔽信道检测方法的研究[D]. 南京:南京理工大学, 2013.
[4] Cabuk S, Brodley C E, Shields C. IP covert timing channels: Design and detection[C]// Proceedings of the 11th ACM Conference on Computer and Communications Security. 2004:178-186.
[6] 刘标. 基于递归定量分析的网络时间隐蔽信道检测方法研究[D]. 南京:南京理工大学, 2015.
[7] Walls R J, Kothari K, Wright M. Liquid: A detection-resistant covert timing channel based on IPD shaping[J]. Computer Networks, 2011,55(6):1217-1228.
[9] Shah G, Molina A, Blaze M. Keyboards and covert channels[C]// Proceedings of the 15th Conference on USENIX Security Symposium. 2006:59-75.
[10] Kemmerer R A. Shared resource matrix methodology: An approach to identifying storage and timing channels[J]. ACM Transactions on Computer Systems, 1983,1(3):256-277.
[11] Kwecka Z. Application Layer Covert Channel Analysis and Detection[R]. Edinburgh Napier University, 2006.
[12] 王箴. 基于聚类和分化特性的网络时间隐蔽信道检测方法的研究[D]. 南京:南京理工大学, 2012.
[13] Berk V, Giani A, Cybenko G. Detection of Covert Channel Encoding in Network Packet Delays[R]. Technical Report TR2005-536, Department of Computer Science, Dartmouth College, 2005.
[14] Peng Pai, Ning Peng, Reeves D S. On the secrecy of timing-based active watermarking trace-back techniques[C]// Proceedings of the 2006 IEEE Symposium on Security and Privacy. 2006:334-349.
[15] Gianvecchio S, Wang Haining. Detecting covert timing channels: An entropy-based approach[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. 2007:307-316.
[16] WAND Network Research Group. WITS: Waikato Ⅷ[DB/OL]. http://wand.net.nz/wits/waikato/8, 2011-12-20. |