Introducing dead drops to network steganography using ARP-caches and SNMP-walks T Schmidbauer, S Wendzel, A Mileva, W Mazurczyk Proceedings of the 14th International Conference on Availability …, 2019 | 15 | 2019 |
Covert storage caches using the NTP protocol T Schmidbauer, S Wendzel Proceedings of the 15th International Conference on Availability …, 2020 | 11 | 2020 |
Sok: A survey of indirect network-level covert channels T Schmidbauer, S Wendzel Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 10 | 2022 |
Challenging channels: Encrypted covert channels within challenge-response authentication T Schmidbauer, J Keller, S Wendzel Proceedings of the 17th International Conference on Availability …, 2022 | 7 | 2022 |
Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime. T Schmidbauer, S Wendzel J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13 (1), 137-166, 2022 | 7 | 2022 |
Hunting shadows: Towards packet runtime-based detection of computational intensive reversible covert channels T Schmidbauer, S Wendzel Proceedings of the 16th International Conference on Availability …, 2021 | 7 | 2021 |
DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data S Wendzel, T Schmidbauer, S Zillien, J Keller arXiv preprint arXiv:2212.11850, 2022 | 1 | 2022 |
Did You See That? A Covert Channel Exploiting Recent Legitimate Traffic S Wendzel, T Schmidbauer, S Zillien, J Keller A Covert Channel Exploiting Recent Legitimate Traffic, 2022 | 1 | 2022 |
SoK T Schmidbauer, S Wendzel Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 1 | 2022 |
Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION S Zillien, T Schmidbauer, M Kubek, J Keller, S Wendzel | | 2024 |
Novel Sophisticated Network-Level Covert Channels T Schmidbauer University of Hagen, Germany, 2023 | | 2023 |