Chapter 16: The Operating System’s “Dead Drop” – Abusing SRUM for Covert Communication Channels<p>16.1 Introduction: Bypassing Network Monitoring with Internal Channels
16.2 Foundation: Architecture and Operation of SRUM in Windows
16.3 Technical Analysis: SRUM-Based Metric Encoding
16.3.2 Encoding and Decoding Messages: Techniques and Optimization
16.4 Impacts and Real-World Applications
16.4.2 Applications in Advanced Attack Scenarios
16.5 Defensive Strategies: Monitoring and Anomaly Detection in SRUM
16.5.2 Building Baselines and Anomaly Detection with Machine Learning