{"id":"https://openalex.org/W2129650762","doi":"https://doi.org/10.1109/malware.2008.4690857","title":"Superimposing permutational covert channels onto reliable stream protocols","display_name":"Superimposing permutational covert channels onto reliable stream protocols","publication_year":2008,"publication_date":"2008-10-01","ids":{"openalex":"https://openalex.org/W2129650762","doi":"https://doi.org/10.1109/malware.2008.4690857","mag":"2129650762"},"language":"en","primary_location":{"id":"doi:10.1109/malware.2008.4690857","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2008.4690857","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 3rd International Conference on Malicious and Unwanted Software (MALWARE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058346194","display_name":"Jamie Levy","orcid":null},"institutions":[{"id":"https://openalex.org/I174216632","display_name":"City University of New York","ror":"https://ror.org/00453a208","country_code":"US","type":"education","lineage":["https://openalex.org/I174216632"]},{"id":"https://openalex.org/I92507152","display_name":"John Jay College of Criminal Justice","ror":"https://ror.org/01p9rc392","country_code":"US","type":"education","lineage":["https://openalex.org/I92507152"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jamie Levy","raw_affiliation_strings":["Department of Math. & Computer Science, John Jay College, CUNY, New York, NY, USA","Dept. of Math.&Comp. Sci., CUNY, New York, NY"],"affiliations":[{"raw_affiliation_string":"Department of Math. & Computer Science, John Jay College, CUNY, New York, NY, USA","institution_ids":["https://openalex.org/I92507152"]},{"raw_affiliation_string":"Dept. of Math.&Comp. Sci., CUNY, New York, NY","institution_ids":["https://openalex.org/I174216632"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025265419","display_name":"Jaroslaw Paduch","orcid":null},"institutions":[{"id":"https://openalex.org/I92507152","display_name":"John Jay College of Criminal Justice","ror":"https://ror.org/01p9rc392","country_code":"US","type":"education","lineage":["https://openalex.org/I92507152"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jaroslaw Paduch","raw_affiliation_strings":["John Jay College of Criminal Justice"],"affiliations":[{"raw_affiliation_string":"John Jay College of Criminal Justice","institution_ids":["https://openalex.org/I92507152"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091193777","display_name":"Bilal Khan","orcid":"https://orcid.org/0000-0002-0382-4502"},"institutions":[{"id":"https://openalex.org/I92507152","display_name":"John Jay College of Criminal Justice","ror":"https://ror.org/01p9rc392","country_code":"US","type":"education","lineage":["https://openalex.org/I92507152"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bilal Khan","raw_affiliation_strings":["John Jay College of Criminal Justice, New York, United States"],"affiliations":[{"raw_affiliation_string":"John Jay College of Criminal Justice, New York, United States","institution_ids":["https://openalex.org/I92507152"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5058346194"],"corresponding_institution_ids":["https://openalex.org/I174216632","https://openalex.org/I92507152"],"apc_list":null,"apc_paid":null,"fwci":1.1708,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.85076988,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"49","last_page":"56"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8038119077682495},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7760037183761597},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.6567739248275757},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6557806730270386},{"id":"https://openalex.org/keywords/datagram","display_name":"Datagram","score":0.5908418893814087},{"id":"https://openalex.org/keywords/transport-layer","display_name":"Transport layer","score":0.5136741995811462},{"id":"https://openalex.org/keywords/network-layer","display_name":"Network layer","score":0.453505277633667},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.43164992332458496},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.41410475969314575},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.37129825353622437},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11212471127510071}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8038119077682495},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7760037183761597},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.6567739248275757},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6557806730270386},{"id":"https://openalex.org/C152298349","wikidata":"https://www.wikidata.org/wiki/Q726868","display_name":"Datagram","level":3,"score":0.5908418893814087},{"id":"https://openalex.org/C7345512","wikidata":"https://www.wikidata.org/wiki/Q209372","display_name":"Transport layer","level":3,"score":0.5136741995811462},{"id":"https://openalex.org/C117468950","wikidata":"https://www.wikidata.org/wiki/Q208074","display_name":"Network layer","level":3,"score":0.453505277633667},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.43164992332458496},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.41410475969314575},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.37129825353622437},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11212471127510071},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/malware.2008.4690857","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2008.4690857","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 3rd International Conference on Malicious and Unwanted Software (MALWARE)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.958.1090","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.958.1090","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.systemic-inquiry.com/cs/security/malware2008.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.972.3409","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.972.3409","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://permeate.sourceforge.net/permeate.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W22266696","https://openalex.org/W49546894","https://openalex.org/W1516960038","https://openalex.org/W1540047495","https://openalex.org/W2060626729","https://openalex.org/W2101132327","https://openalex.org/W2119346375","https://openalex.org/W2124890704","https://openalex.org/W2153486199","https://openalex.org/W2156149713","https://openalex.org/W2157428729","https://openalex.org/W2541749981","https://openalex.org/W2753542457","https://openalex.org/W3214428327","https://openalex.org/W4248409180"],"related_works":["https://openalex.org/W1615036037","https://openalex.org/W1039355687","https://openalex.org/W2496291889","https://openalex.org/W2558509227","https://openalex.org/W4200160609","https://openalex.org/W175990681","https://openalex.org/W1586561748","https://openalex.org/W2479054478","https://openalex.org/W2497803134","https://openalex.org/W1853064034"],"abstract_inverted_index":{"In":[0,25],"this":[1],"paper,":[2],"we":[3,45,128],"present":[4],"a":[5,21,32,121,130,139],"implicit":[6],"encoding":[7],"technique":[8],"that":[9],"makes":[10],"use":[11],"of":[12,99,111,133],"lower-layer":[13],"packet":[14,103],"reordering":[15],"to":[16,68,72,83,94],"superimpose":[17],"covert":[18,48,115,123,140],"messages":[19,49],"onto":[20],"reliable":[22,33],"data":[23,35,88],"stream.":[24],"particular,":[26],"since":[27,90],"the":[28,38,58,62,65,70,85,107],"TCP":[29,91],"layer":[30,87,102],"provides":[31],"in-order":[34],"stream":[36],"over":[37,125],"unreliable":[39],"network":[40,101],"layerpsilas":[41],"IP":[42,53],"datagram":[43],"service,":[44],"can":[46],"encode":[47],"by":[50],"artificially":[51],"permuting":[52],"packets":[54],"before":[55],"they":[56],"leave":[57],"source":[59],"and":[60,109,127,136],"reading":[61],"permutation":[63],"at":[64],"destination":[66],"prior":[67],"delivering":[69],"payload":[71],"TCP.":[73],"Applying":[74],"such":[75,120],"permutations":[76],"will":[77],"not":[78],"adversely":[79],"affect":[80],"TCPpsilas":[81],"ability":[82],"reconstitute":[84],"transport":[86],"stream,":[89],"is":[92],"designed":[93],"be":[95],"robust":[96],"against":[97],"out":[98],"order":[100],"delivery.":[104],"We":[105],"describe":[106],"design":[108],"operation":[110],"PERMEATE,":[112],"an":[113],"open-source":[114],"channel":[116,124],"toolkit":[117],"which":[118],"implements":[119],"permutational":[122],"TCP,":[126],"provide":[129],"quantitative":[131],"assessment":[132],"itpsilas":[134],"efficacy":[135],"efficiency":[137],"as":[138],"channel.":[141]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
