Covert Channel Creation through VPN
Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed
Fault Tolerance and Security
Design of the multi-level security network switch system which restricts covert channel Conference: Communication Software and Networks (ICCSN), 2011 IEEE.
Identification of Covert Channels inside Linux Kernel Based on Source Code
Fault Tolerance and Security Geraint Price Information Security Group Royal Holloway.
DSC 101: Security
1 Best Practices for Vulnerability Assessments Presented by: Nathan Heck, IT Security & Privacy Analyst.
The Keys to the Kingdom Understanding Covert Channels of Communication Russ Rogers CEO Security Horizon, Inc. Co-Founder securitytribe.com.
Covert Channels