{"id":"https://openalex.org/W3195497922","doi":"https://doi.org/10.1145/3465481.3470028","title":"bccstego: A Framework for Investigating Network Covert Channels","display_name":"bccstego: A Framework for Investigating Network Covert Channels","publication_year":2021,"publication_date":"2021-08-16","ids":{"openalex":"https://openalex.org/W3195497922","doi":"https://doi.org/10.1145/3465481.3470028","mag":"3195497922"},"language":"en","primary_location":{"id":"doi:10.1145/3465481.3470028","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3465481.3470028","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001542206","display_name":"Matteo Repetto","orcid":"https://orcid.org/0000-0001-8478-2633"},"institutions":[{"id":"https://openalex.org/I4210131439","display_name":"Applied Mathematics (United States)","ror":"https://ror.org/03seew607","country_code":"US","type":"company","lineage":["https://openalex.org/I4210131439"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Matteo Repetto","raw_affiliation_strings":["Institute for Applied Mathematics and Information Technologies, IT"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Mathematics and Information Technologies, IT","institution_ids":["https://openalex.org/I4210131439"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082854095","display_name":"Luca Caviglione","orcid":"https://orcid.org/0000-0001-6466-3354"},"institutions":[{"id":"https://openalex.org/I4210131439","display_name":"Applied Mathematics (United States)","ror":"https://ror.org/03seew607","country_code":"US","type":"company","lineage":["https://openalex.org/I4210131439"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Luca Caviglione","raw_affiliation_strings":["Institute for Applied Mathematics and Information Technologies, IT"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Mathematics and Information Technologies, IT","institution_ids":["https://openalex.org/I4210131439"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036413712","display_name":"Marco Zuppelli","orcid":"https://orcid.org/0000-0001-6932-3199"},"institutions":[{"id":"https://openalex.org/I4210131439","display_name":"Applied Mathematics (United States)","ror":"https://ror.org/03seew607","country_code":"US","type":"company","lineage":["https://openalex.org/I4210131439"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Marco Zuppelli","raw_affiliation_strings":["Institute for Applied Mathematics and Information Technologies, IT"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Mathematics and Information Technologies, IT","institution_ids":["https://openalex.org/I4210131439"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001542206"],"corresponding_institution_ids":["https://openalex.org/I4210131439"],"apc_list":null,"apc_paid":null,"fwci":1.9563,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.88643417,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8100500702857971},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.7432469725608826},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6624220609664917},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6282399296760559},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.596376895904541},{"id":"https://openalex.org/keywords/ipv4","display_name":"IPv4","score":0.5433867573738098},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5377144813537598},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.5362777709960938},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.49850010871887207},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.49134722352027893},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.47014978528022766},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.43598219752311707},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.43359172344207764},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4162295162677765},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3910861313343048},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.11832022666931152},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11504369974136353},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10205990076065063},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09867492318153381}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8100500702857971},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.7432469725608826},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6624220609664917},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6282399296760559},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.596376895904541},{"id":"https://openalex.org/C2779233093","wikidata":"https://www.wikidata.org/wiki/Q11103","display_name":"IPv4","level":4,"score":0.5433867573738098},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5377144813537598},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.5362777709960938},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.49850010871887207},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.49134722352027893},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.47014978528022766},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.43598219752311707},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.43359172344207764},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4162295162677765},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3910861313343048},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.11832022666931152},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11504369974136353},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10205990076065063},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09867492318153381},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3465481.3470028","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3465481.3470028","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.75}],"awards":[{"id":"https://openalex.org/G3102060732","display_name":null,"funder_award_id":"786922, 833042, 833456","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1981844530","https://openalex.org/W1993704367","https://openalex.org/W2010365467","https://openalex.org/W2011224223","https://openalex.org/W2076003763","https://openalex.org/W2529117343","https://openalex.org/W2544160339","https://openalex.org/W2734941459","https://openalex.org/W2901938775","https://openalex.org/W2963514896","https://openalex.org/W2981391500","https://openalex.org/W3082735423","https://openalex.org/W3103457769","https://openalex.org/W3114468998","https://openalex.org/W3137686326","https://openalex.org/W3162728205"],"related_works":["https://openalex.org/W2349428606","https://openalex.org/W2360869876","https://openalex.org/W3004929566","https://openalex.org/W1849784828","https://openalex.org/W2374277641","https://openalex.org/W2391251019","https://openalex.org/W2791057254","https://openalex.org/W2347589432","https://openalex.org/W2129227231","https://openalex.org/W2391250720"],"abstract_inverted_index":{"Modern":[0],"malware":[1],"increasingly":[2],"exploits":[3],"information":[4],"hiding":[5],"to":[6,28],"remain":[7],"undetected":[8],"while":[9],"attacking.":[10],"To":[11],"this":[12],"aim,":[13],"network":[14],"covert":[15,88],"channels,":[16],"i.e.,":[17],"hidden":[18,67],"communication":[19],"paths":[20],"established":[21],"within":[22],"legitimate":[23],"flows,":[24],"can":[25,48],"be":[26,49],"used":[27],"exfiltrate":[29],"data":[30,47],"or":[31,58],"exchange":[32],"commands":[33],"without":[34],"getting":[35],"noticed":[36],"by":[37],"firewalls,":[38],"antivirus,":[39],"and":[40,72],"intrusion":[41],"detection":[42,86],"systems.":[43],"Since":[44],"the":[45,56,64,77,85],"secret":[46],"directly":[50],"injected":[51],"in":[52],"various":[53],"portions":[54],"of":[55,63,79,87],"stream":[57],"encoded":[59],"via":[60],"suitable":[61],"alterations":[62],"traffic,":[65],"spotting":[66],"communications":[68],"is":[69],"a":[70],"challenging":[71],"poorly":[73],"generalizable":[74],"task.":[75],"Moreover,":[76],"majority":[78],"works":[80],"addressed":[81],"IPv4,":[82],"thus":[83],"leaving":[84],"channels":[89],"targeting":[90],"IPv6":[91],"almost":[92],"unexplored.":[93]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-05T09:29:38.588285","created_date":"2025-10-10T00:00:00"}
