Главная
Study mode:
on
1
Intro
2
Typical Techniques for Covert Channels
3
Shared Resource Matrix
4
Covert Flow Trees
5
Traffic Normalization
6
Other Approaches
7
Summary (pt. 1)
8
Protocol Channels & Protocol Hopping Covert Channels
9
Terminology
10
Combining Multiple Layers
11
Micro Prot. Engineering Approach
12
Status Update Approach
13
Example: Packet Forwarding
14
Requirements for CC Routing
15
Agents and Drones for Overlay Routing
16
Summary (pt. 2)
17
BACnet Protection
18
Introducing MLS using the Open Source BACnet Firewall Router
19
Summary (pt. 3)
20
Related Publications
Description:
Explore a conference talk on advanced data exfiltration techniques and malicious communication methods. Delve into covert channels, protocol channels, and protocol hopping covert channels. Learn about shared resource matrices, covert flow trees, and traffic normalization. Discover micro protocol engineering approaches and status update techniques. Examine packet forwarding examples and requirements for covert channel routing. Investigate agents and drones for overlay routing. Gain insights into BACnet protection and the implementation of multi-level security using an open-source BACnet firewall router. Access related publications to further expand your knowledge on these cutting-edge cybersecurity topics.

The Future of Data Exfiltration and Malicious Communication

WEareTROOPERS
Add to list