Completed
Shared Resource Matrix
Class Central Classrooms beta
YouTube playlists curated by Class Central.
Classroom Contents
The Future of Data Exfiltration and Malicious Communication
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Typical Techniques for Covert Channels
- 3 Shared Resource Matrix
- 4 Covert Flow Trees
- 5 Traffic Normalization
- 6 Other Approaches
- 7 Summary (pt. 1)
- 8 Protocol Channels & Protocol Hopping Covert Channels
- 9 Terminology
- 10 Combining Multiple Layers
- 11 Micro Prot. Engineering Approach
- 12 Status Update Approach
- 13 Example: Packet Forwarding
- 14 Requirements for CC Routing
- 15 Agents and Drones for Overlay Routing
- 16 Summary (pt. 2)
- 17 BACnet Protection
- 18 Introducing MLS using the Open Source BACnet Firewall Router
- 19 Summary (pt. 3)
- 20 Related Publications