Steffen Wendzel

Results 5 comments of Steffen Wendzel

One more comment: I believe that a low-haning fruit would be to implement the magic number as described in section 5.1 of our paper. This will already prevent several rules...

We analyzed the security of ptunnel (original version of the program) from a covert channel protocol perspective in this paper (open access): [https://onlinelibrary.wiley.com/doi/full/10.1002/sec.1471](https://onlinelibrary.wiley.com/doi/full/10.1002/sec.1471) where we also highlight some attacks on...

PS. Here is a survey (but from 2014) on how to design improved covert channel-internal control protocols (see Sect. 3): https://link.springer.com/article/10.1007/s12243-014-0423-x#Sec15 (again: not from a crypto perspective, but from an...

SQLite should be done in /current/. Thus rename to "MySQL" (remove SQlite from title)

This can also be done in the form of a thesis.