The New Threats of Information Hiding: the Road Ahead

01/02/2018
by   K. Cabaj, et al.
0

Compared to cryptography, steganography is a less discussed domain. However, there is a recent trend of exploiting various information hiding techniques to empower malware, for instance to bypass security frameworks of mobile devices or to exfiltrate sensitive data. This is mostly due to the need to counteract increasingly sophisticated security mechanisms, such as code analysis, runtime countermeasures, or real-time traffic inspection tools. In this perspective, this paper presents malware exploiting information hiding in a broad sense, i.e., it does not focus on classical covert channels, but also discusses other camouflage techniques. Differently from other works, this paper solely focuses on real-world threats observed in the 2011 - 2017 timeframe. The observation indicates a growing number of malware equipped with some form of data hiding capabilities and a lack of effective and universal countermeasures.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/04/2023

MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel Malware

Malware is one of the most dangerous and costly cyber threats to nationa...
research
09/08/2021

Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation

Internet of Things devices have seen a rapid growth and popularity in re...
research
02/11/2023

Sequential Embedding-based Attentive (SEA) classifier for malware classification

The tremendous growth in smart devices has uplifted several security thr...
research
07/27/2021

PDF-Malware: An Overview on Threats, Detection and Evasion Attacks

In the recent years, Portable Document Format, commonly known as PDF, ha...
research
02/12/2018

Personal Mobile Malware Guard PMMG: a mobile malware detection technique based on user's preferences

Mobile malware has increased rapidly last 10 years. This rapid increase ...
research
02/23/2022

BYOD Security: A Study of Human Dimensions

The prevalence and maturity of Bring Your Own Device (BYOD) security alo...
research
11/19/2020

KeyGuard: Using Selective Encryption to Mitigate Keylogging in Third-Party IME

As mobile devices become ubiquitous, people around the world have enjoye...

Please sign up or login with your details

Forgot password? Click here to reset