References
- M. Maschler, E. Solan, and S. Zamir, Game Theory, Cambridge University Press, Second Edition 2020.
- S. Anand, S. Sengupta and R. Chandramouli, "An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks," 2010 Proceedings IEEE INFOCOM, San Diego, CA, 2010, pp. 1-9. DOI: https://doi.org/10.1109/INFCOM.2010.5461976.
- J. Wang, W. Tang, X. Li and S. Li, "Optimal Strategy in Covert Communication based on Game Theory," 2019 IEEE/CIC International Conference on Communications in China (ICCC), Changchun, China, 2019, pp. 189-194. DOI: https://doi.org/10.1109/ICCChina.2019.8855950.
- Malte Diehl, "Secure Covert Channels in Multiplayer Games," MM&Sec pp. 117-122, Sep. 2008. DOI: https://doi.org/10.1145/1411328.1411350.
- A. S. Leong, D. E. Quevedo, and S. Dey, "A Game-Theoretic Approach to Covert Communications," https://arxiv.org/pdf/1911.00156.pdf.
- L. Helouet, M. Zeitoun, A. Degorre, "Scenarios and Covert Channels: Another Game...," Electronic Notes in Theoretical Computer Science, 119 (2005), pp. 93-116. DOI: https://doi.org/10.1016/j.entcs.2004.07.010.
- J. Ho, "Covert Channel Establishment Through the Dynamic Adaptation of the Sequential Probability Ratio Test to Sensor Data in IoT," in IEEE Access, vol. 7, pp. 146093-146107, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2945974.
- D. Evtyushkin and D. Ponomarev, "Covert Channels through RandomNumber Generator: Mechanisms, Capacity Estimation and Mitigations," In ACM CCS, 2016. DOI: https://doi.org/10.1145/2976749.2978374.
- M. Guri, Y. Solewicz, A. Daidakulov, and Y. Elovici, "Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise (diskfiltration)," In European Symposium on Research in Computer Security, 2017. DOI: https://doi.org/10.1007/978-3-319-66399-9_6.
- K. Block, S. Narain, and G. Noubir, "An Autonomic and Permissionless Android Covert Channel," In ACM WiSec, 2017. DOI: https://doi.org/10.1145/3098243.3098250.
- W. Qi, Y. Xu, W. Ding, Y. Jiang, J. Wang, and K. Lu, "Privacy Leaks When You Play Games: A Novel User-Behavior-Based Covert Channel on Smartphones," In ICNP, 2015. DOI: https://doi.org/10.1109/ICNP.2015.40.
- P. C. Ritchey and V. J. Rego, "Covert Channels in Combinatorial Games," In DISIO Workshop 2012. DOI:https://doi.org/10.4108/icst.simutools.2012.247733.
- R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang, "Soundcomber: A Stealthy and Context Aware Sound Trojan for Smartphones," In NDSS, 2011.
- T. Heard, D. Johnson, and B. Stackpole, "Exploring a high-capacity covert channel on the Android operating system," In IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2015. DOI: https://doi.org/10.1109/IDAACS.2015.7340765.
- S. Chandra, Z. Lin, A. Kundu, and L. Khan, "Towards a Systematic Study of the Covert Channel Attacks in Smartphones," In SecureComm, 2014. DOI: https://doi.org/10.1007/978-3-319-23829-6_29.
- J. Xiong, L. Xuan, T. Huang, and J. Zhao, "Novel Covert Data Channel in Wireless Sensor Networks Using Compressive Sensing," In Journal of Networks, vol. 7, no. 10, pp. 1523-1529, October 2012. DOI:https://doi.org/10.4304/jnw.7.10.1523-1529.
- A. Al-Haiqi, M. Ismail, and R. Nordin, "A New Sensors-Based Covert Channel on Android," In The Scientific World Journal, DOI: https://doi.org/10.1155/2014/969628, 2014.
- L. Deshotels, "Inaudible Sound as a Covert Channel in Mobile Devices," In WOOT, 2014. DOI: https://doi.org/10.5555/2671293.2671309.
- S. Cabuk, C. Brodley, and C. Shields, "IP covert timing channels: Design and detection," In ACM Conference on Computer and Communications Security, October 2004. DOI: https://doi.org/10.1145/1030083.1030108.
- S. Li and A. Ephremides, "A Network Layer Covert Channel in Ad-hoc Wireless Networks," In IEEE SECON, 2004. DOI: https://doi.org/ 10.1109/SAHCN.2004.1381906.
- C. Maurice, C. Neumann, O. Heen, and A. Francillon, "C5: cross-cores cache covert channel," In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 2015. DOI: https://doi.org/10.1007/978-3-319-20550-2_3.