The New Threats of Information Hiding: the Road Ahead

01/02/2018
by   K. Cabaj, et al.
0

Compared to cryptography, steganography is a less discussed domain. However, there is a recent trend of exploiting various information hiding techniques to empower malware, for instance to bypass security frameworks of mobile devices or to exfiltrate sensitive data. This is mostly due to the need to counteract increasingly sophisticated security mechanisms, such as code analysis, runtime countermeasures, or real-time traffic inspection tools. In this perspective, this paper presents malware exploiting information hiding in a broad sense, i.e., it does not focus on classical covert channels, but also discusses other camouflage techniques. Differently from other works, this paper solely focuses on real-world threats observed in the 2011 - 2017 timeframe. The observation indicates a growing number of malware equipped with some form of data hiding capabilities and a lack of effective and universal countermeasures.

READ FULL TEXT
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 2

page 3

page 4

09/08/2021

Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation

Internet of Things devices have seen a rapid growth and popularity in re...
01/21/2021

Malware Detection and Analysis: Challenges and Research Opportunities

Malwares are continuously growing in sophistication and numbers. Over th...
07/27/2021

PDF-Malware: An Overview on Threats, Detection and Evasion Attacks

In the recent years, Portable Document Format, commonly known as PDF, ha...
08/14/2020

First Step Towards Modeling Unbreakable Malware

Currently, the construction of concealed malicious code has become a tre...
02/12/2018

Personal Mobile Malware Guard PMMG: a mobile malware detection technique based on user's preferences

Mobile malware has increased rapidly last 10 years. This rapid increase ...
02/23/2022

BYOD Security: A Study of Human Dimensions

The prevalence and maturity of Bring Your Own Device (BYOD) security alo...
04/04/2021

Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown

The malware and botnet phenomenon is among the most significant threats ...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.