Date: Thu, 11 May 2000 08:03:37 +0530
From: Udhay Shankar N <[EMAIL PROTECTED]>
http://www.firstmonday.dk/issues/issue2_5/rowland/
The TCP/IP protocol suite has a number of weaknesses that allow an attacker
to leverage techniques in the form of covert channels to surreptitiously
pass data in otherwise benign packets. This paper attempts to illustrate
these weaknesses in both theoretical and practical examples.
Er, they're covert channels all right, but I'd hardly call a paper
that's copyright 1996, and published in a May 1997 journal issue,
"new".