Citation: | “A Novel Covert Timing Channel Based on RTP/RTCP,” Chinese Journal of Electronics, vol. 21, no. 4, pp. 711-714, 2012, |
G.J. Simmons, “The prisoners’ problem and the subliminalchannel”, Advances in Cryptology Proceedings of Crypto,Vol.83, pp.51-67, 1983.
|
RFC 3550:2003, RTP: A Transport Protocol for Real-Time Applications.
|
S. Zander, G. Armitage and P. Branch, “A Survey of covertchannels and countermeasures in computer network protocols”,IEEE Communications Surveys & Tutorials, Vol.9, No.3,pp.44-57, 2007.
|
S. Cabuk, C.E. Brodley, C. Shields, “IP covert timing channels:Design and detection”, Proc. of ACM CCS’04, Washington,DC, U.S.A, pp.179-187, 2004.
|
Steven J. Murdoch, Stephen Lewis, “Embedding covert channelsinto TCP/IP”, Proc. of the 7th International Conferenceon Information Hiding, Barcelona, Spain, pp.247-261, 2005.
|
Sarah H. Sellke, Chih-Chun Wang, Saurabh Bagchi, “TCP/IPtiming channels: Theory to implementation”, Proc. of IEEEINFOCOM 2009, Rio de Janeiro, Brazil, pp.178-187, 2009
|
Liu Xiong, Dai Yiqi, “A typical network covert timing channelwith uniformly distributed noise”, Chinese Journal of Electronics,Vol.20, No.4, pp.730-734, 2011.
|
Miao Rui, Huang Yongfeng, “An approach of covert communicationbased on the adaptive steganography scheme on voiceover IP”, Proc. of IEEE ICC 2011, Tokyo, Japan, pp.1-5, 2011.
|
Huang Yongfeng, Yuan Jian, Chen Minchao, Xiao Bo, “Key distributionover the covert communication based on VoIP”, ChineseJournal of Electronics, Vol.20, No.2, pp.357-360, 2011.
|
Linda Yunlu Bai, Huang Yongfeng, Hou Guannan, Xiao Bo,“Covert channels based on jitter field of the RTCP header”,Proc. of IEEE IIHMSP 2008, Harbin, China, pp.1388-1391,2008.
|