Diese Datei ist eine HTML-Version des Literaturverzeichnisses aus
der Diplomarbeit.
[Amo94] |
Amoroso, Edward G.: Fundamentals of Computer Security Technology.
Prentice-Hall, Inc., 1994.
Erhältlich bei http://amazon.co.uk als Print-on-demand-Buch, £ 39,99.
|
[Ana] |
Analyzer-Homepage.
http://netgroup-serv.polito.it/analyzer/ (29.12.2004).
|
[Apaa] |
Download-Adresse für die Apache-Version 1.3.31.
http://archive.apache.org/dist/httpd/apache_1.3.31.tar.gz (29.12.2004).
|
[Apab] |
Apache Web-Server.
http://www.apache.org.
|
[Apac] |
Apache: HTTP Server Application Program Interface für Version 1.3.
http://httpd.apache.org/docs/misc/API.html.
|
[Bau03] |
Bauer, Matthias: New Covert Channels in HTTP: Adding Unwitting Web
Browsers to Anonymity Sets.
Proceedings of the Workshop on Privacy in the
Electronic Society (WPES 2003), Washington, DC, USA, Oktober 2003.
http://www1.informatik.uni-erlangen.de/~bauer/109-bauer.ps.
|
[Bea99] |
Beazley, David M.: Python Essential Reference.
New Riders Publishing, 1999.
ISBN 0-7357-0901-7.
|
[BL73] |
Bell, D.E. und J. La Padula: Secure Computer Systems:
Mathematical Foundations.
The MITRE Corporation, Bedford, MA, März 1973.
Technical report, ESD-TR-73- 278-I.
|
[Bra89] |
Braden, R. T.: Requirements for Internet hosts - communication
layers.
RFC 1122, Internet Engineering Task Force, 1989.
http://www.rfc-editor.org/rfc/rfc1122.txt.
|
[Cct] |
Cctt-Homepage.
http://www.entreelibre.com/cctt/index_en.html (29.12.2004).
|
[Cha81] |
Chaum, David: Untraceable electronic mail, return addresses, and digital
pseudonyms.
Communications of the ACM, 4(2), Februar 1981.
http://www.csl.mtu.edu/cs6461/www/Reading/08/Chaum-ACMCOMM81.pdf.
|
[Com] |
CommView-Homepage.
http://www.tamos.com/ (29.12.2004).
|
[CSo04] |
Socket Programming in C: Programmbeispiele, 2004.
http://pont.net/socket/ (01.11.2004).
|
[Dae96] |
Daemon9: Project Loki: ICMP tunneling.
Phrack, 7(49), 1996.
http://www.phrack.org/show.php?p=49&a=6.
|
[Dae97] |
Daemon9: LOKI2 (the implementation).
Phrack, 7(51), 1997.
http://www.phrack.org/show.php?p=51&a=6.
|
[DC03] |
Dyatlov, Alex und Simon Castro: Exploitation of data
streams authorized by a network access control system for arbitrary data
transfers: tunneling and covert channels over the HTTP protocol.
Juni 2003.
http://gray-world.net/projects/papers/html/covert_paper.html (12.06.2004).
|
[Eat97] |
Eaton, John W.: GNU Octave - A high-level interactive language for
numerical computations.
3. Auflage, 1997.
Benutzerhandbuch zu Octave.
|
[EL00] |
Ernst, Nico und Jörg Luther: AOL/Netscape spioniert Surfer
aus.
TecChannel, 2000.
http://www.tecchannel.de/internet/468/ (12.06.2004).
|
[eth] |
Ethereal-Homepage.
http://www.ethereal.com/.
|
[Eße05] |
Eßer, Hans-Georg: Ausnutzung verdeckter Kanäle am Beispiel eines
Web-Servers - Download-Bereich, 2005.
http://privat.hgesser.com/docs/Info-Diplom/.
|
[FBH+02] |
Feamster, Nick, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan
und David Karger: Infranet: Circumventing Web Censorship
and Surveillance.
11th USENIX Security Symposium, San Francisco,
CA, August 2002.
http://www.usenix.org/publications/library/proceedings/sec02/feamster/feamster.pdf.
|
[FGM+99] |
Fielding, R., J. Gettys, J. Mogul, H. Frystyk, L. Masinter,
P. Leach und T. Berners-Lee: Hypertext Transfer Protocol
- HTTP.
RFC 2616, Internet Engineering Task Force, 1999.
http://www.rfc-editor.org/rfc/rfc2616.txt.
|
[Gas88] |
Gasser, Morrie: Building a Secure Computer System.
Van Nostrand Reinhold, Juni 1988.
ISBN: 0442230222.
http://nucia.ist.unomaha.edu/library/gasser.php.
|
[Ger02] |
Gerber, Tim: Phone-home-Vorwürfe an Netscape.
Heise News, 2002.
http://www.heise.de/newsticker/meldung/25493 (12.06.2004).
|
[Gla] |
GLADE-Homepage.
http://glade.gnome.org/.
|
[GMS95] |
Goossens, M., F. Mittelbach und A. Samarin: Der
LATEX-Begleiter.
Addison-Wesley, 1995.
|
[Gol03] |
Goltz, James P.: Under the radar: A look at three covert communications
channels.
GSEC practical assignment, 2003.
http://web.mmert.org/~goltz/GSEC/Jim_Goltz_GSEC_edit.pdf (17.07.2004).
|
[Goo] |
The Google Timeline.
http://www.google.com/corporate/timeline.html (18.02.2005).
|
[Ham50] |
Hamming, R. W.: Error detecting and error correcting codes.
The Bell System Tech. Journal, XXIX(2):147-160, 1950.
http://engelschall.com/~sb/hamming/ (eingescannt).
|
[Har01] |
Hartmann, Mike: Netzwerk Sniffer.
TecChannel, 2001.
http://www.tecchannel.de/hardware/766/ (12.06.2004).
|
[Het02] |
Hetzl, Stefan: Steghide Man Page, 2002.
http://steghide.sourceforge.net/documentation/manpage.php (12.06.2004).
|
[Htt] |
Httptunnel-Homepage.
http://www.nocrew.org/software/httptunnel.html (29.12.2004).
|
[Ile04] |
Ilett, Dan: Lexmark accused of installing spyware,
2004.
ZDNet UK,
http://news.zdnet.co.uk/internet/security/0,39020375,39173517,00.htm (30.12.2004).
|
[JDB92] |
Jacobson, V., R. Draden und D. Borman: TCP Extensions for
High Performance.
RFC 1323, Internet Engineering Task Force, 1992.
http://www.faqs.org/rfcs/rfc1323.html.
|
[Kes04] |
Kessler, Gary C.: An Overview of Steganography for the Computer
Forensics Examiner.
Forensic Science Communications, 6(3), 2004.
http://www.fbi.gov/hq/lab/fsc/backissu/july2004/research/2004_03_research01.htm.
|
[Lam73] |
Lampson, Butler W.: A note on the confinement problem.
Commun. ACM, 16(10):613-615, 1973.
http://www.cs.cornell.edu/andru/cs711/2003fa/reading/lampson73note.pdf.
|
[Lan70] |
Lang, Serge: Linear Algebra.
Addison-Wesley Publishing Company, 2. Auflage, 1970.
|
[LL99] |
Laurie, Ben und Peter Laurie: Apache: The Definitive
Guide.
O'Reilly, 2. Auflage, 1999.
ISBN: 1-56592-528-9.
|
[Lut96] |
Lutz, Mark: Programming Python.
O'Reilly & Associates, Inc., 1. Auflage, 1996.
ISBN 1-56592-197-6.
|
[Mac03] |
MacKay, David J. C.: Information Theory, Inference, and Learning
Algorithms.
Cambridge University Press, 2003.
http://www.inference.phy.cam.ac.uk/mackay/itila/.
|
[Mat96] |
Mathar, Rudolf: Informationstheorie, 9
Aachener Beiträge zur Mathematik.
Verlag der Augustinus Buchhandlung, 1996.
Skript zur Vorlesung.
|
[MD90] |
Mogul, J. C. und S. E. Deering: Path MTU discovery.
RFC 1191, Internet Engineering Task Force, 1990.
http://www.rfc-editor.org/rfc/rfc1191.txt.
|
[MM94] |
Moskowitz, Ira S. und Allen R. Miller: Simple Timing
Channels.
SP '94: Proceedings of the 1994 IEEE Symposium on
Security and Privacy, 56. IEEE Computer Society, 1994.
http://chacs.nrl.navy.mil/publications/CHACS/1994moskowitz-oakland.ps.
|
[MP90] |
Mathar, Rudolf und Dietmar Pfeifer: Stochastik für
Informatiker.
Leitfäden und Monographien der Informatik. B. G. Teubner, Stuttgart,
1990.
|
[MSO01] |
Mitchell, Mark, Alex Samuel und Jeffrey Oldham: Advanced
Linux Programming.
Sams (Pearson Education), 2001.
ISBN: 0735710430.
|
[Nma] |
Nmap-Homepage.
http://www.insecure.org/nmap/ (29.12.2004).
|
[Oct] |
Octave-Homepage.
http://www.octave.org/.
|
[PAK99] |
Petitcolas, Fabien A. P., Ross J. Anderson und Markus G. Kuhn:
Information hiding--A survey.
Proceedings of the IEEE, 87(7):1062-1078, 1999.
http://www.petitcolas.net/fabien/publications/ieee99-infohiding.pdf.
|
[PkZ] |
PkZIP-Homepage.
http://www.pkware.com/products/enterprise/unix/ (29.12.2004).
|
[Pos81a] |
Postel, John: Internet Control Message Protocol.
RFC 792, Internet Engineering Task Force, 1981.
http://www.rfc-editor.org/rfc/rfc792.txt.
|
[Pos81b] |
Postel, Jon B.: Internet Protocol.
RFC 791, Internet Engineering Task Force, 1981.
http://www.rfc-editor.org/rfc/rfc791.txt.
|
[Pos81c] |
Postel, Jon B.: Transmission Control Protocol.
RFC 793, Internet Engineering Task Force, September 1981.
http://www.ietf.org/rfc/rfc793.txt.
|
[Pos83] |
Postel, Jon B.: TCP maximum segment size and related topics.
RFC 879, Internet Engineering Task Force, 1983.
http://www.rfc-editor.org/rfc/rfc879.txt.
|
[rev] |
Revsh-Homepage.
http://freshmeat.net/projects/revsh/ (29.12.2004).
|
[Sch95] |
Schneier, Bruce: Applied cryptography (2nd ed.): protocols, algorithms,
and source code in C.
John Wiley & Sons, Inc., 1995.
|
[Sch97] |
Schweitzer, Frank: Selbstorganisation und Information.
in: Krapp, H. und Th. Wagenbaur: Komplexität und Selbstorganisation - Chaos
in Natur- und Kulturwissenschaften, 9-129. Wilhelm Fink
Verlag, 1997.
http://summa.physik.hu-berlin.de/~frank/download/web-tueb.pdf.
|
[Sha48] |
Shannon, C. E.: A Mathematical Theory of Communication.
The Bell System Technical Journal, 27:379-423, 623-656, Oktober
1948.
http://cm.bell-labs.com/cm/ms/what/shannonday/shannon1948.pdf.
|
[Sko00] |
Skoll, David F.: A PPPoE Implementation for Linux.
Proceedings of the 4th Annual Linux Showcase &
Conference, Atlanta, Georgia, USA, 2000. USENIX.
http://www.roaringpenguin.com/images/resources_files/PPPoEforLinux.pdf.
|
[SMC02] |
Shannon, Colleen, David Moore und K.C. Claffy: Beyond
folklore: observations on fragmented traffic.
IEEE/ACM Transactions on Networking, 10(6):709-720,
2002.
http://www.caida.org/outreach/papers/2002/Frag/frag.pdf.
|
[Smi02] |
Smith, Richard M.: Serious privacy problems in Windows Media
Player for Windows XP.
2002.
http://www.computerbytesman.com/privacy/wmp8dvd.htm (12.06.2004).
|
[Spa03] |
Spangler, Ryan: Analysis of Remote Active Operating System
Fingerprinting Tools, 2003.
http://www.packetwatch.net/documents/papers/osdetection.pdf (12.06.2004).
|
[Sta02] |
Stallman, Richard M.: Why Free Software is better than Open Source.
In: Free Software, Free Society: Selected Essays of
Richard M. Stallman. Oktober 2002.
http://www.gnu.org/philosophy/free-software-for-freedom.html.
|
[Ste97] |
Stevens, W. Richard: TCP Slow Start, Congestion Avoidance, Fast
Retransmit, and Fast Recovery Algorithms.
RFC 2001, Internet Engineering Task Force, 1997.
http://www.faqs.org/rfcs/rfc2001.html.
|
[Ste00] |
Stevens, W. Richard: Programmieren von UNIX-Netzwerken.
Carl Hanser Verlag, München, 2. Auflage, 2000.
ISBN: 3-446-21334-1,
Beispielprogramme:
ftp://ftp.cs.columbia.edu/pub/dcc/classes/CS4119-S98/stevens/unpv12e.tar.gz.
|
[Tou] |
Touretzky, Dave: Steganography Wing of the Gallery of CSS
Descramblers.
http://www-2.cs.cmu.edu/~dst/DeCSS/Gallery/Stego/ (29.12.2004).
|
[Xpr] |
Xprobe2-Homepage.
http://www.sys-security.com/index.php?page=xprobe.
|
[Yes] |
YesCoder-Homepage.
http://mitglied.lycos.de/JoergGrohne/yescoder.html.
|