Welcome![Sign In][Sign Up]
Location:
Search - covert channel

Search list

[Internet-Networkcctt-0.1.8.tar

Description: Cctt, \"Covert Channel Tunneling Tool\" - 顾名思义,这是一种隐藏通道工具。他提供几种可行方法来实现允许在已被网络访问控制系统授权的数据流上创建并建立任意数据流传输信道。-Cctt, "Covert Channel Tunneling Tool" - the name implies, this is a hidden channel tools. He provided several possible ways to achieve has been allowed in the network access control system authorized by the data flow on the creation and establishment of arbitrary data stream transmission channels.
Platform: | Size: 208373 | Author: 欧锋 | Hits:

[Internet-Networkcctt-0.1.8.tar

Description: Cctt, "Covert Channel Tunneling Tool" - 顾名思义,这是一种隐藏通道工具。他提供几种可行方法来实现允许在已被网络访问控制系统授权的数据流上创建并建立任意数据流传输信道。-Cctt, "Covert Channel Tunneling Tool"- the name implies, this is a hidden channel tools. He provided several possible ways to achieve has been allowed in the network access control system authorized by the data flow on the creation and establishment of arbitrary data stream transmission channels.
Platform: | Size: 207872 | Author: 欧锋 | Hits:

[Other Databasesdatabase_security

Description: 一个关于数据库隐通道和数据库加解密的Java代码,数据库平台为达梦数据库-One on the database covert channel and database encryption and decryption of the Java code, database platform for up to a dream Database
Platform: | Size: 23552 | Author: Ducktracy | Hits:

[Othervoip

Description: 信息隐藏作为一门新兴的信息安全技术最近受到人们的普遍关注。文章选择VoIP作为信息隐藏的载体,研究了基于VoIP的隐蔽通信的实现方法。首先分析了基于VoIP隐蔽通信技术的特征和优点;提出了VoIP隐蔽通信的实现过程的模型和多种隐蔽信道;最后介绍了基于VoIP的隐蔽通信软件的实现算法。-Information hiding, as a new information security technology has recently been the people attention. Article options hidden VoIP as an information carrier, research-based VoIP implementations of covert communication. First, analysis of covert communication based on VoIP technology, features and advantages put forward the realization of VoIP covert communication process model and a variety of covert channel Finally the hidden-based VoIP communication software algorithm.
Platform: | Size: 179200 | Author: 强强 | Hits:

[Windows DevelopTiming_Channel_MFC

Description: 实现了一个MFC的时间隐蔽信道,可以使用-MFC time to implement a covert channel, you can use
Platform: | Size: 274432 | Author: 文明 | Hits:

[Speech/Voice recognition/combineGSM-voice-cipher

Description: 一种基于GSM的低码率语音信息隐秘传输方法。 本文描述了一种可将一路低码率2.4kb/s混合激励线性预测(MELP)编码语音信息,隐藏在另一路13kb/s的GSM编码语音中,通过公共信道隐秘传输的方法。文中给出了一种新的数据嵌入方法,该方法以一个单位增广矩阵为基础,可在(2L+1)比特可修改信息中嵌入2L比特数据信息,而最多只需修改£比特宿主信息,有较高的数据嵌入率,算法计算复杂度较低,较易于硬件实现,且对宿主信息的影响也较少。-GSM-based low bit rate voice covert communication methods. This paper describes a low bit rate can be all the way to 2.4kb/s Mixed Excitation Linear Prediction (MELP) encoded voice information, hidden in another way 13kb/s of GSM encoded voice, through the public channel covert communication methods. The paper gives a new data embedding method to a unit based on the augmented matrix can be (2L+1) bits of information can be modified to embed 2L bits of data information, and a maximum of £ modify the host bits of information , a high data embedding rate, low complexity algorithm, hardware implementation easier, and the impact of information on the host less.
Platform: | Size: 809984 | Author: 郝清 | Hits:

[Linux-Unixcovert-channel-(c-language)

Description: linux中隐蔽通道源代码(c语言) 采用sleep(秒)/usleep(微秒)制造同步。 当一个进程sleep时,就将cpu的控制权交给其他进程,直到sleep时间已到,重新获得cpu的控制权。 -linux source code in the covert channel (c language)
Platform: | Size: 8192 | Author: xc | Hits:

[Embeded-SCM DevelopICMP-covert-channel

Description: ICMP隐蔽信道实现,包括嵌入算法和提取算法-ICMP covert channel,includeing the Embedding Algorithm and the Extraction algorithm.
Platform: | Size: 76800 | Author: 徐露 | Hits:

[Software EngineeringTunnel-based-on-http

Description: 本文详细研究了HTTP协议报文的内容,对于HTTP协议 有了全面深入的了解;在此基础上,本文给出了构建HTTP隐蔽通道 的三种通用模型(简单HTTP模型、代理模型、CGI模型)和四种常用 的方法(GET方法、HEAD方法、POST方法、PUT方法)- The thesis structure is as follows: Firstly, this dissertation not only investigates the message structure of HTTP in detail, but also provides general models and methods for covert 上海交通大学硕士论文 - VII- channel operations. Secondly, this dissertation studies the message structure of Microsoft Windows System .In further, we investigate the message mechanism of Microsoft Windows System.
Platform: | Size: 5239808 | Author: 张成武 | Hits:

[JSP/JavaLipingJi1SA

Description: Implementation of LipingJi s paper A Novel Covert Channel Based on Length of Messages Steganography.
Platform: | Size: 190464 | Author: PhonPhanom | Hits:

[AlgorithmLipingJi2SA

Description: Simulator of Liping Ji s A normal-traffic network covert channel Steganography, Steganlysis-Simulator of Liping Ji s A normal-traffic network covert channel Steganography, Steganlysis
Platform: | Size: 189440 | Author: PhonPhanom | Hits:

[DocumentsCapturelive

Description: For searching covert channel in live packet
Platform: | Size: 8192 | Author: lemanifik | Hits:

[DocumentsCaptureliveipv4

Description: looking for IPV4 covert channel
Platform: | Size: 9216 | Author: lemanifik | Hits:

[DocumentsCapturelivetcp

Description: looking for TCP covert channel
Platform: | Size: 8192 | Author: lemanifik | Hits:

[DocumentsRechercheCC

Description: looking for IPV4 covert channel in a given packet
Platform: | Size: 6144 | Author: lemanifik | Hits:

[Documentssp_cc

Description: looking for IPV4 covert channel in a live capture packets
Platform: | Size: 100352 | Author: lemanifik | Hits:

CodeBus www.codebus.net