A Review on Covert Techniques
Due to the widespread adoption of the internet and its services, protocols have been established and new ones arise every year. Either for securing connections, ciphering information or service authentication, protocols place an important part in network communications. The TCP/IP has become one of the ubiquitous protocol suites for secure communication, and therefore, a desirable target for covert information encapsulation. In this article, we will discuss the art of unauthorized data transfer - covert techniques - for data encapsulation in protocol data packets, emphasizing headers fields manipulation.
Marcelo Santos, Luis Barroso
FEUP MIEIC MSc Thesis Template
Template for MIEIC's MSc thesis and thesis preparations projects.
Made by João Correia Lopes (jcl) https://web.fe.up.pt/~jlopes/doku.php/teach/feupteses
António Almeida, João Correia Lopes
FCUP thesis layout
A thesis model for FCUP MsC and PhD thesis.
For more information, check the original github repository.