A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Practical overview of a Xen covert channel
2009
Journal in Computer Virology
Covert channels have been known since a long time and under various forms. Methods used by designers to exchange information with discretion depend mainly on their creativity. These streams of data are so stealthy that they can be easily used by some dishonest persons or malwares. In an (supposed) other world, the virtualization of operating systems has brought a higher flexibility in the deployment of server farms and shared hosting. It also brings hopes concerning security through
doi:10.1007/s11416-009-0131-7
fatcat:p25zas3kazdxpetoywvbgy5aou