{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:27:33Z","timestamp":1725751653641},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642411472"},{"type":"electronic","value":"9783642411489"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41148-9_19","type":"book-chapter","created":{"date-parts":[[2013,10,9]],"date-time":"2013-10-09T18:47:31Z","timestamp":1381344451000},"page":"273-288","source":"Crossref","is-referenced-by-count":2,"title":["Real-Time Covert Timing Channel Detection in Networked Virtual Environments"],"prefix":"10.1007","author":[{"given":"Anyi","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jim","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Harry","family":"Wechsler","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","volume-title":"Multiresolution Signal Decomposition: Transforms, Subbands and Wavelets","author":"A. Akansu","year":"2001","unstructured":"A. Akansu and P. Haddad, Multiresolution Signal Decomposition: Transforms, Subbands and Wavelets, Academic Press, San Diego, California, 2001."},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/945445.945462","volume-title":"Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles","author":"P. Barham","year":"2003","unstructured":"P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt and A. Warfield, Xen and the art of virtualization, Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 164\u2013177, 2003."},{"key":"19_CR3","volume-title":"Proceedings of the Second Annual Workshop on Flow Analysis","author":"V. Berk","year":"2005","unstructured":"V. Berk, A. Giani and G. Cybenko, Covert channel detection using process query systems, Proceedings of the Second Annual Workshop on Flow Analysis, 2005."},{"issue":"4","key":"19_CR4","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1109\/TIT.1972.1054855","volume":"18","author":"R. Blahut","year":"1972","unstructured":"R. Blahut, Computation of channel capacity and rate-distortion functions, IEEE Transactions on Information Theory, vol. 18(4), pp. 460\u2013473, 1972.","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR5","unstructured":"S. Cabuk, Network Covert Channels: Design, Analysis, Detection and Elimination, Ph.D. Dissertation, Department of Computer Science, Purdue University, West Lafayette, Indiana, 2006."},{"key":"19_CR6","first-page":"211","volume-title":"Proceedings of the Fourteenth ACM Conference on Computer and Communications Security","author":"S. Gianvecchio","year":"2007","unstructured":"S. Gianvecchio and H. Wang, Detecting covert timing channels: An entropy-based approach, Proceedings of the Fourteenth ACM Conference on Computer and Communications Security, pp. 211\u2013230, 2007."},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-540-87403-4_12","volume-title":"Proceedings of the Eleventh International Symposium on Recent Advances in Intrusion Detection","author":"S. Gianvecchio","year":"2008","unstructured":"S. Gianvecchio, H. Wang, D. Wijesekera and S. Jajodia, Model-based covert timing channels: Automated modeling and evasion, Proceedings of the Eleventh International Symposium on Recent Advances in Intrusion Detection, pp. 211\u2013230, 2008."},{"key":"19_CR8","first-page":"194","volume-title":"Proceedings of the Second International Conference on Privacy Enhancing Technologies","author":"J. Giffin","year":"2002","unstructured":"J. Giffin, R. Greenstadt, P. Litwack and R. Tibbetts, Covert messaging through TCP timestamps, Proceedings of the Second International Conference on Privacy Enhancing Technologies, pp. 194\u2013208, 2002."},{"key":"19_CR9","volume-title":"Nonparametric Statistical Methods","author":"M. Hollander","year":"1999","unstructured":"M. Hollander and D. Wolfe, Nonparametric Statistical Methods, John Wiley, New York, 1999."},{"key":"19_CR10","first-page":"429","volume-title":"Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks","author":"J. Jin","year":"2009","unstructured":"J. Jin and X. Wang, On the effectiveness of low-latency anonymous network in the presence of timing attack, Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 429\u2013438, 2009."},{"issue":"1","key":"19_CR11","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1214\/aoms\/1177729694","volume":"22","author":"S. Kullback","year":"1951","unstructured":"S. Kullback and R. Leibler, On information and sufficiency, Annals of Mathematical Statistics, vol. 22(1), pp. 79\u201386, 1951.","journal-title":"Annals of Mathematical Statistics"},{"issue":"2","key":"19_CR12","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s10618-007-0064-z","volume":"15","author":"J. Lin","year":"2007","unstructured":"J. Lin, E. Keogh, L. Wei and S. Lonardi, Experiencing SAX: A novel symbolic representation of time series, Data Mining and Knowledge Discovery, vol. 15(2), pp. 107\u2013144, 2007.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"19_CR13","first-page":"120","volume-title":"Proceedings of the Fourteenth European Conference on Research in Computer Security","author":"Y. Liu","year":"2009","unstructured":"Y. Liu, D. Ghosal, F. Armknecht, A. Sadeghi, S. Schulz and S. Katzenbeisser, Hide and seek in time: Robust covert timing channels, Proceedings of the Fourteenth European Conference on Research in Computer Security, pp. 120\u2013135, 2009."},{"key":"19_CR14","first-page":"335","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"P. Peng","year":"2006","unstructured":"P. Peng, P. Ning and D. Reeves, On the secrecy of timing-based active watermarking trace-back techniques, Proceedings of the IEEE Symposium on Security and Privacy, pp. 335\u2013349, 2006."},{"key":"19_CR15","volume-title":"Harmonic Analysis: From Fourier to Wavelets","author":"M. Pereyra","year":"2012","unstructured":"M. Pereyra and L. Ward, Harmonic Analysis: From Fourier to Wavelets, American Mathematical Society, Providence, Rhode Island, 2012."},{"key":"19_CR16","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-540-87403-4_4","volume-title":"Proceedings of the Eleventh International Symposium on Recent Advances in Intrusion Detection","author":"D. Ramsbrock","year":"2008","unstructured":"D. Ramsbrock, X. Wang and X. Jiang, A first step towards live botmaster traceback, Proceedings of the Eleventh International Symposium on Recent Advances in Intrusion Detection, pp. 59\u201377, 2008."},{"key":"19_CR17","volume-title":"Proceedings of the Fifteenth USENIX Security Symposium","author":"G. Shah","year":"2006","unstructured":"G. Shah, A. Molina and M. Blaze, Keyboards and covert channels, Proceedings of the Fifteenth USENIX Security Symposium, 2006."},{"key":"19_CR18","unstructured":"United States Government Accountability Office, Cyberspace: United States Faces Challenges in Addressing Global Cybersecurity and Governance, Report to Congressional Requesters, GAO-10-606, Washington, DC, 2010."},{"key":"19_CR19","unstructured":"VMWare, Timekeeping in VMWare virtual machines, Palo Alto, California (\n \n www.vmware.com\/files\/pdf\/Timekeeping-In-VirtualMachines.pdf\n \n \n ), 2011."},{"key":"19_CR20","first-page":"81","volume-title":"Proceedings of the Twelfth ACM Conference on Computer and Communications Security","author":"X. Wang","year":"2005","unstructured":"X. Wang, S. Chen and S. Jajodia, Tracking anonymous peer-to-peer VoIP calls on the Internet, Proceedings of the Twelfth ACM Conference on Computer and Communications Security, pp. 81\u201391, 2005."},{"issue":"1-2","key":"19_CR21","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1093\/biomet\/34.1-2.28","volume":"34","author":"B. Welch","year":"1947","unstructured":"B. Welch, The generalization of student\u2019s problem when several different population variances are involved, Biometrika, vol. 34(1-2), pp. 28\u201335, 1947.","journal-title":"Biometrika"},{"key":"19_CR22","first-page":"563","volume-title":"Proceedings of the Eighteenth ACM Conference on Computer and Communications Security","author":"D. Zhang","year":"2011","unstructured":"D. Zhang, A. Askarov and A. Myers, Predictive mitigation of timing channels in interactive systems, Proceedings of the Eighteenth ACM Conference on Computer and Communications Security, pp. 563\u2013574, 2011."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41148-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T04:33:18Z","timestamp":1548736398000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41148-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642411472","9783642411489"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41148-9_19","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}