참고문헌
- Tech. Rep. DOD 5200 28-ST, Department of Defence Supersedes CSC-STD-001-83 Department of Defence trusted computer system evaluation criteria
- Proc. Workshop on Multimedia Scurity at ACM Multimedia '02 Practical Data Hiding in TCP/IP K.Ahsan;D.Kundur
- Proc. of th Communications of the ACM no.16;10 A note on the confinment problem B.W.Lampson
- Proc. 1991 Symposium on Research in Security and Privacy Analyzing covert storage channels P.A.Porras;R.A.Kemmerer
- Proc. 1991 Symposium on Research in Security and Privacy An analysis of covert timing channels J.C.Wray
- A Chapter of the Handbook for the Computer Security Certification of Trusted Systems Covert Channel Analysis, Technical Memorundum 5540:080A, Naval Research Laboratory J.McHugh
- Information Hiding; Steganography and Watermarking - Attacks and Conuter measures Neil,F.Johnson(et al.)
- Proceedings of the 5th international workshop on information hiding, of Lecture Notes in Computer Science no.2578 Information hiding Fabien,A;P.Petitcolas(ed.)
- Phrack Magazine v.7 Project Loki: ICMP Tunnelling daemon9;alhambra
- Tech. Rep. 5, First Monday, Peer Reviewed Journal on the Internet Covert channels in the TCP/IP protocol suite C.H.Rowland
- GNU httptunnel Brinkhoff,Lars
- PET2002 Covert Messaging Through TCP Timestamps John Giffin
- IP Checksum covert channels and selected hash collision Christopher Abad
- ICON DNS Tunnel - through bastion hosts Oskar Pearson
- Fryxar, tunnelshell
- rwwwshell van Hauser
- proxytunnel Jos Visser
- web shell Alex Dyatlov
- ICMP tunneling tool
- Confidence Remains High ICMP backdoor client and server BiT
- v1.5 Placing Backdoors Through Firewalls van Hauser
- IH 2002, LNCS 2578 Eliminating Steganography in Internet Traffic with Active Wardens Gina Fisk;F.A.P.Petitcolas(ed.)
- ICICS 2003, LNCS 2836 A Study on the Covert Channel Detection of TCP/IP Header using Support Vector Machine Sohn,Tae Shik;Seo,Jung Taek;Moon,Jong Sub
- MMM-ACNS 2001, LNCS 2052 Mathematical Models of the Covert Channels Alexander Grusho;V.I.Gorodetski(et al.)(eds.)
- MMM-ACNS 2003, LNCS 2276 Construction of the covert channels Alexander Grusho;ElenaTimonina;V.I.Gorodetski(et al.)(eds.)
- Exploitatioin of data streams authorized by a network access control system for arbitrary data transfers: tunneling and covert channels over the HTTP protocol. vl.0.