1 |
A. Al-Haiqi, M. Ismail, and R. Nordin. A New Sensors-Based Covert Channel on Android. The Scientific World Journal, 2014.
|
2 |
A. El-Atawy and E. Al-Shaer, Building covert channels over the packet reordering phenomenon, In IEEE INFOCOM, 2009.
|
3 |
L. Deshotels, Inaudible sound as a covert channel in mobile devices, In WOOT, 2014.
|
4 |
J. G. N, R. Greenstadt, P. Litwack, and R. Tibbetts, "Covert messaging through tcp timestamps," In Workshop on Privacy Enhancing Technologies, 2002.
|
5 |
J. Ho, K. Won, and J. Kim. POSTER: Covert Channel Based on the Sequential Analysis in Android Systems. In ACM CCS, 2017.
|
6 |
J. Lalande and S. Wendzel. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In ARES, 2013.
|
7 |
S. Li and A. Epliremides, A network layer covert channel in ad- hoc wireless networks, In IEEE SECON, 2004.
|
8 |
E. Novak, Y. Tang, Z. Hao, Q. Li, and Y. Zhang. Physical media covert channels on smart mobile devices. In UbiComp, 2015.
|
9 |
K. Okamura and Y. Oyama, Load-based covert channels between xen virtual machines, In SAC, 2010.
|
10 |
W. Qi, Y. Xu, W. Ding, Y. Jiang, J. Wang, and K. Lu. Privacy Leaks When You Play Games: A Novel User Behavior Based Covert Channel on Smartphones. In ICNP, 2015.
|
11 |
R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A Stealthy and ContextAware Sound Trojan for Smartphones. In NDSS, 2011.
|
12 |
Z. Wang and R. B. Lee, Covert and side channels due to processor architecture, In ACSAC, 2006.
|
13 |
Z. Wu, Z. Xu, and H. Wang, Whispers in the hyper-space: High-speed covert channel attacks in the cloud, In USENIX Security, 2012
|