Abr 27 2011
Cluster positioning as a code
To provide an additional layer of evasion, two-fold plausible deniability can be used to provide the covertly communicating parties two chances to deny the presence of hidden information. In their first attempt, the parties simply deny the very existence of hidden data. If the first approach does not succeed, they still have the option to only reveal the less sensitive information and deny the presence of any other hidden data on the medium as
in Anderson et al. (1998); McDonald and Kuhn (1999); Pang et al. (2003).»
Paper: «Designing a cluster-based covert channel to evade disk investigation and forensics» Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan Mirza; Elsevier’s «Computers & Security» 30 (2011) p 35 -49
Via New Scientist
Comentarios desactivados en Cluster positioning as a code