All Stories

  1. Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication
  2. Towards Passive Identification of Aged Android Devices in the Home Network
  3. Steganography Hiding Patterns: A Brief Review
  4. SoK
  5. Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems
  6. How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data
  7. Reset- and Reconnection-based Covert Channels in CoAP
  8. Risks and Opportunities for Information Hiding in DICOM Standard
  9. A Revised Taxonomy of Steganography Embedding Patterns
  10. Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels
  11. Crème de la Crème: Lessons from Papers in Security Publications
  12. Anomaly Detection in ICS based on Data-history Analysis
  13. Covert Channels in One-Time Passwords Based on Hash Chains
  14. Covert storage caches using the NTP protocol
  15. Design and performance evaluation of reversible network covert channels
  16. Not all areas are equal: analysis of citations in information security research
  17. Towards Reversible Storage Network Covert Channels
  18. Protocol-independent Detection of "Messaging Ordering" Network Covert Channels
  19. Countering adaptive network covert communication with dynamic wardens
  20. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach
  21. Get Me Cited, Scotty!
  22. The New Threats of Information Hiding: The Road Ahead
  23. Emerging and Unconventional: New Attacks and Innovative Detection Techniques
  24. Detection of Covert Channels in TCP Retransmissions
  25. Information hiding
  26. Recent Advancements in Digital Forensics
  27. The Future of Digital Forensics: Challenges and the Road Ahead
  28. Cyber Security of Smart Buildings
  29. Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach
  30. Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators
  31. Don’t You Touch My Nuts: Information Hiding in Cyber Physical Systems
  32. Network Information Hiding and Science 2.0: Can it be a Match?
  33. Enhanced Ant Colony-Inspired ParallelAlgorithm to Improve Cryptographic PRNGs
  34. Steganography for Cyber-physicalSystems
  35. POSTER
  36. IoT Security: The Improvement-Decelerating 'Cycle of Blame'
  37. Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions
  38. How to increase the security of smart buildings?
  39. Covert channel-internal control protocols: attacks and defense
  40. Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures
  41. Countermeasures for Covert Channel-Internal Control Protocols
  42. Pattern-Based Survey and Categorization of Network Covert Channel Techniques
  43. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments
  44. Securing BACnet’s Pitfalls
  45. Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making
  46. “The Good, The Bad and The Ugly”: Evaluation of Wi-Fi Steganography
  47. On importance of steganographic cost for network steganography
  48. Hidden and under control
  49. Hidden and Uncontrolled – On the Emergence of Network Steganographic Threats
  50. IT-gestütztes Management und Controlling
  51. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels
  52. Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet
  53. Detecting protocol switching covert channels
  54. Covert and side channels in buildings and the prototype of a building-aware active warden
  55. Einführung
  56. Fortgeschrittene Themen für verdeckte Kanäle
  57. Geheimes Tunneling
  58. Grundlagen verdeckter Kanäle
  59. Prävention und Detektion verdeckter Kanäle
  60. Systematic Engineering of Control Protocols for Covert Channels
  61. TCP/IP-Grundlagen für das Tunneling
  62. Tunnel und verdeckte Kanäle im Netz
  63. Tunneling-Protokolle
  64. A secure interoperable architecture for building-automation applications
  65. Low-Attention Forwarding for Mobile Network Covert Channels