Private Homepage von Hans-Georg Eßer










Blaue Links: intern
Rote Links: extern

Ausnutzung verdeckter Kanäle am Beispiel eines Web-Servers > Literatur


Diese Datei ist eine HTML-Version des Literaturverzeichnisses aus der Diplomarbeit.

[Amo94] Amoroso, Edward G.: Fundamentals of Computer Security Technology. Prentice-Hall, Inc., 1994. Erhältlich bei als Print-on-demand-Buch, £ 39,99.
[Ana] Analyzer-Homepage. (29.12.2004).
[Apaa] Download-Adresse für die Apache-Version 1.3.31. (29.12.2004).
[Apab] Apache Web-Server.
[Apac] Apache: HTTP Server Application Program Interface für Version 1.3.
[Bau03] Bauer, Matthias: New Covert Channels in HTTP: Adding Unwitting Web Browsers to Anonymity Sets. Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003), Washington, DC, USA, Oktober 2003.
[Bea99] Beazley, David M.: Python Essential Reference. New Riders Publishing, 1999. ISBN 0-7357-0901-7.
[BL73] Bell, D.E. und J. La Padula: Secure Computer Systems: Mathematical Foundations. The MITRE Corporation, Bedford, MA, März 1973. Technical report, ESD-TR-73- 278-I.
[Bra89] Braden, R. T.: Requirements for Internet hosts - communication layers. RFC 1122, Internet Engineering Task Force, 1989.
[Cct] Cctt-Homepage. (29.12.2004).
[Cha81] Chaum, David: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), Februar 1981.
[Com] CommView-Homepage. (29.12.2004).
[CSo04] Socket Programming in C: Programmbeispiele, 2004. (01.11.2004).
[Dae96] Daemon9: Project Loki: ICMP tunneling. Phrack, 7(49), 1996.
[Dae97] Daemon9: LOKI2 (the implementation). Phrack, 7(51), 1997.
[DC03] Dyatlov, Alex und Simon Castro: Exploitation of data streams authorized by a network access control system for arbitrary data transfers: tunneling and covert channels over the HTTP protocol. Juni 2003. (12.06.2004).
[Eat97] Eaton, John W.: GNU Octave - A high-level interactive language for numerical computations. 3. Auflage, 1997. Benutzerhandbuch zu Octave.
[EL00] Ernst, Nico und Jörg Luther: AOL/Netscape spioniert Surfer aus. TecChannel, 2000. (12.06.2004).
[eth] Ethereal-Homepage.
[Eße05] Eßer, Hans-Georg: Ausnutzung verdeckter Kanäle am Beispiel eines Web-Servers - Download-Bereich, 2005.
[FBH+02] Feamster, Nick, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan und David Karger: Infranet: Circumventing Web Censorship and Surveillance. 11th USENIX Security Symposium, San Francisco, CA, August 2002.
[FGM+99] Fielding, R., J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach und T. Berners-Lee: Hypertext Transfer Protocol - HTTP. RFC 2616, Internet Engineering Task Force, 1999.
[Gas88] Gasser, Morrie: Building a Secure Computer System. Van Nostrand Reinhold, Juni 1988. ISBN: 0442230222.
[Ger02] Gerber, Tim: Phone-home-Vorwürfe an Netscape. Heise News, 2002. (12.06.2004).
[Gla] GLADE-Homepage.
[GMS95] Goossens, M., F. Mittelbach und A. Samarin: Der LATEX-Begleiter. Addison-Wesley, 1995.
[Gol03] Goltz, James P.: Under the radar: A look at three covert communications channels. GSEC practical assignment, 2003. (17.07.2004).
[Goo] The Google Timeline. (18.02.2005).
[Ham50] Hamming, R. W.: Error detecting and error correcting codes. The Bell System Tech. Journal, XXIX(2):147-160, 1950. (eingescannt).
[Har01] Hartmann, Mike: Netzwerk Sniffer. TecChannel, 2001. (12.06.2004).
[Het02] Hetzl, Stefan: Steghide Man Page, 2002. (12.06.2004).
[Htt] Httptunnel-Homepage. (29.12.2004).
[Ile04] Ilett, Dan: Lexmark accused of installing spyware, 2004. ZDNet UK,,39020375,39173517,00.htm (30.12.2004).
[JDB92] Jacobson, V., R. Draden und D. Borman: TCP Extensions for High Performance. RFC 1323, Internet Engineering Task Force, 1992.
[Kes04] Kessler, Gary C.: An Overview of Steganography for the Computer Forensics Examiner. Forensic Science Communications, 6(3), 2004.
[Lam73] Lampson, Butler W.: A note on the confinement problem. Commun. ACM, 16(10):613-615, 1973.
[Lan70] Lang, Serge: Linear Algebra. Addison-Wesley Publishing Company, 2. Auflage, 1970.
[LL99] Laurie, Ben und Peter Laurie: Apache: The Definitive Guide. O'Reilly, 2. Auflage, 1999. ISBN: 1-56592-528-9.
[Lut96] Lutz, Mark: Programming Python.
O'Reilly & Associates, Inc., 1. Auflage, 1996. ISBN 1-56592-197-6.
[Mac03] MacKay, David J. C.: Information Theory, Inference, and Learning Algorithms. Cambridge University Press, 2003.
[Mat96] Mathar, Rudolf: Informationstheorie, 9 Aachener Beiträge zur Mathematik. Verlag der Augustinus Buchhandlung, 1996. Skript zur Vorlesung.
[MD90] Mogul, J. C. und S. E. Deering: Path MTU discovery. RFC 1191, Internet Engineering Task Force, 1990.
[MM94] Moskowitz, Ira S. und Allen R. Miller: Simple Timing Channels. SP '94: Proceedings of the 1994 IEEE Symposium on Security and Privacy, 56. IEEE Computer Society, 1994.
[MP90] Mathar, Rudolf und Dietmar Pfeifer: Stochastik für Informatiker. Leitfäden und Monographien der Informatik. B. G. Teubner, Stuttgart, 1990.
[MSO01] Mitchell, Mark, Alex Samuel und Jeffrey Oldham: Advanced Linux Programming. Sams (Pearson Education), 2001. ISBN: 0735710430.
[Nma] Nmap-Homepage. (29.12.2004).
[Oct] Octave-Homepage.
[PAK99] Petitcolas, Fabien A. P., Ross J. Anderson und Markus G. Kuhn: Information hiding--A survey. Proceedings of the IEEE, 87(7):1062-1078, 1999.
[PkZ] PkZIP-Homepage. (29.12.2004).
[Pos81a] Postel, John: Internet Control Message Protocol. RFC 792, Internet Engineering Task Force, 1981.
[Pos81b] Postel, Jon B.: Internet Protocol. RFC 791, Internet Engineering Task Force, 1981.
[Pos81c] Postel, Jon B.: Transmission Control Protocol. RFC 793, Internet Engineering Task Force, September 1981.
[Pos83] Postel, Jon B.: TCP maximum segment size and related topics. RFC 879, Internet Engineering Task Force, 1983.
[rev] Revsh-Homepage. (29.12.2004).
[Sch95] Schneier, Bruce: Applied cryptography (2nd ed.): protocols, algorithms, and source code in C. John Wiley & Sons, Inc., 1995.
[Sch97] Schweitzer, Frank: Selbstorganisation und Information. in: Krapp, H. und Th. Wagenbaur: Komplexität und Selbstorganisation - Chaos in Natur- und Kulturwissenschaften, 9-129. Wilhelm Fink Verlag, 1997.
[Sha48] Shannon, C. E.: A Mathematical Theory of Communication. The Bell System Technical Journal, 27:379-423, 623-656, Oktober 1948.
[Sko00] Skoll, David F.: A PPPoE Implementation for Linux. Proceedings of the 4th Annual Linux Showcase & Conference, Atlanta, Georgia, USA, 2000. USENIX.
[SMC02] Shannon, Colleen, David Moore und K.C. Claffy: Beyond folklore: observations on fragmented traffic. IEEE/ACM Transactions on Networking, 10(6):709-720, 2002.
[Smi02] Smith, Richard M.: Serious privacy problems in Windows Media Player for Windows XP. 2002. (12.06.2004).
[Spa03] Spangler, Ryan: Analysis of Remote Active Operating System Fingerprinting Tools, 2003. (12.06.2004).
[Sta02] Stallman, Richard M.: Why Free Software is better than Open Source. In: Free Software, Free Society: Selected Essays of Richard M. Stallman. Oktober 2002.
[Ste97] Stevens, W. Richard: TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms. RFC 2001, Internet Engineering Task Force, 1997.
[Ste00] Stevens, W. Richard: Programmieren von UNIX-Netzwerken. Carl Hanser Verlag, München, 2. Auflage, 2000. ISBN: 3-446-21334-1, Beispielprogramme:
[Tou] Touretzky, Dave: Steganography Wing of the Gallery of CSS Descramblers. (29.12.2004).
[Xpr] Xprobe2-Homepage.
[Yes] YesCoder-Homepage.

Copyright © 1997-2021 Hans-Georg Eßer; Server: Debian Linux, Apache Web Server, letzte Änderung: Thursday, 03-Nov-2016 15:27:57 CET
Theme: Hazard Area 1.6 (modified), created by Bryan Bell, Copyright © 2000-2006