@conference{Rios2012_1, author = "Rios, Ruben and Onieva, Jose A. and Lopez, Javier", abstract = "Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in multilevel security systems in the early 70{\textquoteright}s they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications. We analyze a protocol extensively used today, the Dynamic Host Configuration Protocol (DHCP), in search of new forms of covert communication. From this analysis we observe several features that can be effectively exploited for subliminal data transmission. This results in the implementation of HIDE_DHCP, which integrates three covert channels that accommodate to different stealthiness and bandwidth requirements ", address = "Heraklion, Crete, Greece", booktitle = "Proceedings of the 27th IFIP TC 11 International Information Security and Privacy Conference (SEC 2012)", doi = "http://dx.doi.org/10.1007/978-3-642-30436-1_14", editor = "Dimitris Gritzalis and Steve Furnell and Marianthi Theoharidou", isbn = "978-3-642-30435-4", issn = "1868-4238", keywords = "Covert channels, Network Security, System Information Security", month = "June", note = "partner: UMA projects: NESSoS, ARES, SACO, TIER: B, citations: 1", pages = "162-173", publisher = "Springer Boston", series = "IFIP AICT", title = "{HIDE}_{DHCP}: {C}overt {C}ommunications {T}hrough {N}etwork {C}onfiguration {M}essages", volume = "376", year = "2012", }