1 |
M. Maschler, E. Solan, and S. Zamir, Game Theory, Cambridge University Press, Second Edition 2020.
|
2 |
S. Anand, S. Sengupta and R. Chandramouli, "An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks," 2010 Proceedings IEEE INFOCOM, San Diego, CA, 2010, pp. 1-9. DOI: https://doi.org/10.1109/INFCOM.2010.5461976.
DOI
|
3 |
J. Wang, W. Tang, X. Li and S. Li, "Optimal Strategy in Covert Communication based on Game Theory," 2019 IEEE/CIC International Conference on Communications in China (ICCC), Changchun, China, 2019, pp. 189-194. DOI: https://doi.org/10.1109/ICCChina.2019.8855950.
DOI
|
4 |
Malte Diehl, "Secure Covert Channels in Multiplayer Games," MM&Sec pp. 117-122, Sep. 2008. DOI: https://doi.org/10.1145/1411328.1411350.
DOI
|
5 |
A. S. Leong, D. E. Quevedo, and S. Dey, "A Game-Theoretic Approach to Covert Communications," https://arxiv.org/pdf/1911.00156.pdf.
|
6 |
M. Guri, Y. Solewicz, A. Daidakulov, and Y. Elovici, "Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise (diskfiltration)," In European Symposium on Research in Computer Security, 2017. DOI: https://doi.org/10.1007/978-3-319-66399-9_6.
DOI
|
7 |
L. Helouet, M. Zeitoun, A. Degorre, "Scenarios and Covert Channels: Another Game...," Electronic Notes in Theoretical Computer Science, 119 (2005), pp. 93-116. DOI: https://doi.org/10.1016/j.entcs.2004.07.010.
DOI
|
8 |
J. Ho, "Covert Channel Establishment Through the Dynamic Adaptation of the Sequential Probability Ratio Test to Sensor Data in IoT," in IEEE Access, vol. 7, pp. 146093-146107, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2945974.
DOI
|
9 |
D. Evtyushkin and D. Ponomarev, "Covert Channels through RandomNumber Generator: Mechanisms, Capacity Estimation and Mitigations," In ACM CCS, 2016. DOI: https://doi.org/10.1145/2976749.2978374.
DOI
|
10 |
K. Block, S. Narain, and G. Noubir, "An Autonomic and Permissionless Android Covert Channel," In ACM WiSec, 2017. DOI: https://doi.org/10.1145/3098243.3098250.
DOI
|
11 |
W. Qi, Y. Xu, W. Ding, Y. Jiang, J. Wang, and K. Lu, "Privacy Leaks When You Play Games: A Novel User-Behavior-Based Covert Channel on Smartphones," In ICNP, 2015. DOI: https://doi.org/10.1109/ICNP.2015.40.
DOI
|
12 |
A. Al-Haiqi, M. Ismail, and R. Nordin, "A New Sensors-Based Covert Channel on Android," In The Scientific World Journal, DOI: https://doi.org/10.1155/2014/969628, 2014.
DOI
|
13 |
P. C. Ritchey and V. J. Rego, "Covert Channels in Combinatorial Games," In DISIO Workshop 2012. DOI:https://doi.org/10.4108/icst.simutools.2012.247733.
DOI
|
14 |
R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang, "Soundcomber: A Stealthy and Context Aware Sound Trojan for Smartphones," In NDSS, 2011.
|
15 |
T. Heard, D. Johnson, and B. Stackpole, "Exploring a high-capacity covert channel on the Android operating system," In IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2015. DOI: https://doi.org/10.1109/IDAACS.2015.7340765.
DOI
|
16 |
S. Chandra, Z. Lin, A. Kundu, and L. Khan, "Towards a Systematic Study of the Covert Channel Attacks in Smartphones," In SecureComm, 2014. DOI: https://doi.org/10.1007/978-3-319-23829-6_29.
DOI
|
17 |
J. Xiong, L. Xuan, T. Huang, and J. Zhao, "Novel Covert Data Channel in Wireless Sensor Networks Using Compressive Sensing," In Journal of Networks, vol. 7, no. 10, pp. 1523-1529, October 2012. DOI:https://doi.org/10.4304/jnw.7.10.1523-1529.
DOI
|
18 |
L. Deshotels, "Inaudible Sound as a Covert Channel in Mobile Devices," In WOOT, 2014. DOI: https://doi.org/10.5555/2671293.2671309.
DOI
|
19 |
S. Cabuk, C. Brodley, and C. Shields, "IP covert timing channels: Design and detection," In ACM Conference on Computer and Communications Security, October 2004. DOI: https://doi.org/10.1145/1030083.1030108.
DOI
|
20 |
S. Li and A. Ephremides, "A Network Layer Covert Channel in Ad-hoc Wireless Networks," In IEEE SECON, 2004. DOI: https://doi.org/ 10.1109/SAHCN.2004.1381906.
DOI
|
21 |
C. Maurice, C. Neumann, O. Heen, and A. Francillon, "C5: cross-cores cache covert channel," In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 2015. DOI: https://doi.org/10.1007/978-3-319-20550-2_3.
DOI
|