[1] |
SIMMONS G J , . The prisoners’ problem and the subliminal channel[C]// Advances in Cryptology. Berlin:Springer, 1984: 51-67.
|
[2] |
李彦峰, 丁丽萍, 吴敬征 ,等. 网络隐蔽信道关键技术研究综述[J]. 软件学报, 2019,30(8): 2470-2490.
|
|
LI Y F , DING L P , WU J ZH ,et al. Survey on key issues in networks covert channel[J]. Journal of Software, 2019,30(8): 2470-2490.
|
[3] |
SOHN T , SEO J , MOON J . A study on the covert channel detection of TCP/IP header using support vector machine[C]// International Conference on Information and Communications Security. Berlin:Springer, 2003: 313-324.
|
[4] |
FISK G , FISK M , PAPADOPOULOS C ,et al. Eliminating steganography in Internet traffic with active wardens[C]// International Workshop on Information Hiding. Berlin:Springer, 2002: 18-35.
|
[5] |
HANDLEY M , PAXSON V , KREIBICH C . Network intrusion detection:evasion,traffic normalization,and end-to-end protocol semantics[C]// Proceedings of the 10th conference on USENIX Security Symposium. Berkeley:USENIX Association, 2001:9.
|
[6] |
LEWANDOWSKI G , LUCENA N B , CHAPIN S J . Analyzing network-aware active wardens in IPv6[C]// International Workshop on Information Hiding. Berlin:Springer, 2006: 58-77.
|
[7] |
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. Decentralized Business Review, 2008.
|
[8] |
祝烈煌, 高峰, 沈蒙 ,等. 区块链隐私保护研究综述[J]. 计算机研究与发展, 2017,54(10): 2170-2186.
|
|
ZHU L H , GAO F , SHEN M ,et al. Survey on privacy preserving techniques for blockchain technology[J]. Journal of Computer Research and Development, 2017,54(10): 2170-2186.
|
[9] |
PARTALA J . Provably secure covert communication on blockchain[J]. Cryptography, 2018,2(3): 18.
|
[10] |
CAO H , YIN H , GAO F ,et al. Chain-based covert data embedding schemes in blockchain[J]. IEEE Internet of Things Journal,2020:doi.org/10.1109/JIOT.2020.3040389.
|
[11] |
BASUKI A I , ROSIYADI D . Joint transaction-image steganography for high capacity covert communication[C]// Proceedings of 2019 International Conference on Computer,Control,Informatics and its Applications (IC3INA). Piscataway:IEEE Press, 2019: 41-46.
|
[12] |
TIAN J , GOU G P , LIU C ,et al. DLchain:a covert channel over blockchain based on dynamic labels[C]// Information and Communications Security. Berlin:Springer, 2020: 814-830.
|
[13] |
BRENNER M , CHRISTIN N , JOHNSON B ,et al. Financial cryptography and data security[M]. Berlin: Springer, 2015.
|
[14] |
GAO F , ZHU L H , GAI K K ,et al. Achieving a covert channel over an open blockchain network[J]. IEEE Network, 2020,34(2): 6-13.
|
[15] |
PLOHMANN D , YAKDAN K , KLATT M ,et al. A comprehensive measurement study of domain generating malware[C]// Proceedings of the 25th USENIX Conference on Security Symposium. Berkeley:USENIX Association, 2016: 263-278.
|
[16] |
吕婧淑, 操晓春 . 基于比特币系统的隐蔽通信技术[J]. 信息安全学报, 2021,6(2): 143-152.
|
|
LYU J S , CAO X C . Covert communication technology based on bitcoin[J]. Journal of Cyber Security, 2021,6(2): 143-152.
|
[17] |
ZHANG L J , ZHANG Z J , WANG W Z ,et al. A covert communication method using special bitcoin addresses generated by vanitygen[J]. Computers,Materials & Continua, 2020,65(1): 597-616.
|
[18] |
李彦峰, 丁丽萍, 吴敬征 ,等. 区块链环境下的新型网络隐蔽信道模型研究[J]. 通信学报, 2019,40(5): 67-78.
|
|
LI Y F , DING L P , WU J Z ,et al. Research on a new network covert channel model in blockchain environment[J]. Journal on Communications, 2019,40(5): 67-78.
|
[19] |
ABDULAZIZ M , ?ULHA D , YAZICI A . A decentralized application for secure messaging in a trustless environment[C]// Proceedings of 2018 International Congress on Big Data,Deep Learning and Fighting Cyber Terrorism (IBIGDELFT). Piscataway:IEEE Press, 2018: 1-5.
|
[20] |
LEE B , LEE M Y , KO H S ,et al. A secure mobile messenger based on Ethereum whisper[J]. The Journal of Korean Institute of Communications and Information Sciences, 2017,42(7): 1477-1484.
|
[21] |
ZHANG L J , ZHANG Z J , JIN Z L ,et al. An approach of covert communication based on the Ethereum whisper protocol in blockchain[J]. International Journal of Intelligent Systems, 2021,36(2): 962-996.
|
[22] |
DEMERS A , GREENE D , HAUSER C ,et al. Epidemic algorithms for replicated database maintenance[C]// Proceedings of the 6th Annual ACM Symposium on Principles of Distributed Computing. New York:ACM Press, 1987: 1-12.
|
[23] |
BONNEAU J , MILLER A , CLARK J ,et al. SoK:research perspectives and challenges for bitcoin and cryptocurrencies[C]// Proceedings of 2015 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2015: 104-121.
|