Information theft through covert channel by exploiting HTTP post method | IEEE Conference Publication | IEEE Xplore