{"id":"https://openalex.org/W2968706816","doi":"https://doi.org/10.1145/3339252.3341488","title":"Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks","display_name":"Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks","publication_year":2019,"publication_date":"2019-08-09","ids":{"openalex":"https://openalex.org/W2968706816","doi":"https://doi.org/10.1145/3339252.3341488","mag":"2968706816"},"language":"en","primary_location":{"id":"doi:10.1145/3339252.3341488","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3341488","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090086091","display_name":"Tobias Schmidbauer","orcid":"https://orcid.org/0000-0001-5912-0857"},"institutions":[{"id":"https://openalex.org/I120691247","display_name":"University of Hagen","ror":"https://ror.org/04tkkr536","country_code":"DE","type":"education","lineage":["https://openalex.org/I120691247"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Tobias Schmidbauer","raw_affiliation_strings":["University of Hagen, Germany"],"affiliations":[{"raw_affiliation_string":"University of Hagen, Germany","institution_ids":["https://openalex.org/I120691247"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072118587","display_name":"Steffen Wendzel","orcid":"https://orcid.org/0000-0002-1913-5912"},"institutions":[{"id":"https://openalex.org/I151001649","display_name":"University of Applied Sciences Worms","ror":"https://ror.org/031ph8d53","country_code":"DE","type":"education","lineage":["https://openalex.org/I151001649"]},{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Steffen Wendzel","raw_affiliation_strings":["Worms University of Applied Science &amp; Fraunhofer FKIE, Germany"],"affiliations":[{"raw_affiliation_string":"Worms University of Applied Science &amp; Fraunhofer FKIE, Germany","institution_ids":["https://openalex.org/I151001649","https://openalex.org/I4210166245"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004771056","display_name":"Aleksandra Mileva","orcid":"https://orcid.org/0000-0003-0706-6355"},"institutions":[{"id":"https://openalex.org/I4210161475","display_name":"Goce Delcev University","ror":"https://ror.org/058q1cn43","country_code":"MK","type":"education","lineage":["https://openalex.org/I4210161475"]}],"countries":["MK"],"is_corresponding":false,"raw_author_name":"Aleksandra Mileva","raw_affiliation_strings":["University Goce Delcev, Macedonia"],"affiliations":[{"raw_affiliation_string":"University Goce Delcev, Macedonia","institution_ids":["https://openalex.org/I4210161475"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089469997","display_name":"Wojciech Mazurczyk","orcid":"https://orcid.org/0000-0002-8509-4127"},"institutions":[{"id":"https://openalex.org/I108403487","display_name":"Warsaw University of Technology","ror":"https://ror.org/00y0xnp53","country_code":"PL","type":"education","lineage":["https://openalex.org/I108403487"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Wojciech Mazurczyk","raw_affiliation_strings":["Warsaw University of Technology, Poland"],"affiliations":[{"raw_affiliation_string":"Warsaw University of Technology, Poland","institution_ids":["https://openalex.org/I108403487"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5090086091"],"corresponding_institution_ids":["https://openalex.org/I120691247"],"apc_list":null,"apc_paid":null,"fwci":2.0203,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.90129976,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8105073571205139},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.790158748626709},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.624029278755188},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.6158304214477539},{"id":"https://openalex.org/keywords/simple-network-management-protocol","display_name":"Simple Network Management Protocol","score":0.48301371932029724},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4112653434276581},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.3168771266937256},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17477983236312866}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8105073571205139},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.790158748626709},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.624029278755188},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.6158304214477539},{"id":"https://openalex.org/C69527307","wikidata":"https://www.wikidata.org/wiki/Q184230","display_name":"Simple Network Management Protocol","level":3,"score":0.48301371932029724},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4112653434276581},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.3168771266937256},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17477983236312866},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3339252.3341488","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3341488","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.ugd.edu.mk:22385","is_oa":false,"landing_page_url":"https://dl.acm.org/citation.cfm?id=3341488","pdf_url":null,"source":{"id":"https://openalex.org/S4306402353","display_name":"Goce Delchev University Repository (Goce Del\u010dev University of \u0160tip)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210161475","host_organization_name":"Goce Delcev University","host_organization_lineage":["https://openalex.org/I4210161475"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"},{"id":"pmh:oai:fraunhofer.de:N-624867","is_oa":false,"landing_page_url":"http://publica.fraunhofer.de/documents/N-624867.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400801","display_name":"Publikationsdatenbank der Fraunhofer-Gesellschaft (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer FKIE","raw_type":"Conference Paper"},{"id":"pmh:oai:publica.fraunhofer.de:publica/410118","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/410118","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1518773424","https://openalex.org/W1542606043","https://openalex.org/W1761375015","https://openalex.org/W1826893312","https://openalex.org/W1981844530","https://openalex.org/W1993704367","https://openalex.org/W2031029123","https://openalex.org/W2099137371","https://openalex.org/W2124464827","https://openalex.org/W2132759147","https://openalex.org/W2153259761","https://openalex.org/W2167403301","https://openalex.org/W2243309921","https://openalex.org/W2556536142","https://openalex.org/W2963418062","https://openalex.org/W4230634801","https://openalex.org/W4250521920","https://openalex.org/W4298283890","https://openalex.org/W4299591939","https://openalex.org/W4300945730","https://openalex.org/W4302575854","https://openalex.org/W6746574011"],"related_works":["https://openalex.org/W2409612194","https://openalex.org/W4224042389","https://openalex.org/W174282171","https://openalex.org/W20460883","https://openalex.org/W2378542861","https://openalex.org/W2778862807","https://openalex.org/W624949607","https://openalex.org/W2355117120","https://openalex.org/W2376818286","https://openalex.org/W2392647619"],"abstract_inverted_index":{"Network":[0,160],"covert":[1,25,90,104,109,142,155],"channels":[2],"enable":[3],"various":[4],"secret":[5,13,112],"data":[6,132],"exchange":[7,102],"scenarios":[8],"among":[9],"two":[10],"or":[11,65],"more":[12],"parties":[14],"via":[15],"a":[16,51,81,89,141],"communication":[17,53,105],"network.":[18],"The":[19],"diversity":[20],"of":[21,38,42,121],"the":[22,35,45,55,98,108,115,130,135,146,154],"existing":[23],"network":[24,91,100,143],"channel":[26],"techniques":[27],"has":[28],"rapidly":[29],"increased":[30],"due":[31],"to":[32,70],"research":[33],"during":[34],"last":[36],"couple":[37],"years":[39],"and":[40,145],"most":[41],"them":[43],"share":[44],"same":[46],"characteristics,":[47],"i.e.,":[48,88],"they":[49],"require":[50],"direct":[52,99],"between":[54,103],"participating":[56],"partners.":[57],"However,":[58],"it":[59,66],"is":[60,74,126,138],"sometimes":[61],"simply":[62],"not":[63,95,127],"possible":[64],"can":[67,149],"raise":[68],"suspicions":[69],"communicate":[71],"directly.":[72],"That":[73],"why,":[75],"in":[76,114,129],"this":[77],"paper":[78],"we":[79,84],"introduce":[80],"new":[82],"concept":[83],"call":[85],"\"dead":[86],"drop\",":[87],"storage":[92,144],"which":[93],"does":[94],"depend":[96],"on":[97],"traffic":[101],"sides.":[106],"Instead,":[107],"sender":[110],"stores":[111],"information":[113,148],"ARP":[116,136],"(Address":[117],"Resolution":[118],"Protocol)":[119],"cache":[120,137],"an":[122],"unaware":[123],"host":[124],"that":[125],"involved":[128],"hidden":[131],"exchange.":[133],"Thus,":[134],"used":[139],"as":[140],"accumulated":[147],"then":[150],"be":[151],"extracted":[152],"by":[153],"receiver":[156],"using":[157],"SNMP":[158],"(Simple":[159],"Management":[161],"Protocol).":[162]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
