The Keys To The Kingdom: Understanding Covert Channels Of Communication presented at Blackhat USA 2004

by Russ Rogers,

Tags: Security Exploitation

Summary : Security professionals see the
compromise of networked systems on a day to day basis. It's something
they've come to expect. The blatant exploitation of operating systems,
applications, and configurations is a common event and is taken into
account by most security engineers. But a different type of security
compromise threatens to crumble the underlying security of the modern