The New Threats of Information Hiding: The Road Ahead

@article{Cabaj2018TheNT,
  title={The New Threats of Information Hiding: The Road Ahead},
  author={Krzysztof Cabaj and L. Caviglione and W. Mazurczyk and S. Wendzel and A. Woodward and S. Zander},
  journal={IT Professional},
  year={2018},
  volume={20},
  pages={31-39}
}
  • Krzysztof Cabaj, L. Caviglione, +3 authors S. Zander
  • Published 2018
  • Computer Science
  • IT Professional
  • A recent trend involves exploiting various information-hiding techniques to empower malware-for example, to bypass mobile device security frameworks or to exfiltrate sensitive data. The authors provide an overview of information-hiding techniques that can be utilized by malware. They showcase existing and emerging threats that use different types of data-hiding mechanisms (not just those adopting classical covert channels), with the goal of monitoring these threats and proposing efficient… CONTINUE READING
    26 Citations

    Figures, Tables, and Topics from this paper.

    Explore Further: Topics Discussed in This Paper

    IPv6 Covert Channels in the Wild
    • 2
    Programmable Data Gathering for Detecting Stegomalware
    A survey of zero-day malware attacks and its detection methodology

    References

    SHOWING 1-10 OF 24 REFERENCES
    Information Hiding as a Challenge for Malware Detection
    • 48
    • PDF
    Improving the Stealthiness of DNS-Based Covert Communication
    • 4
    Stealthy malware traffic - Not as innocent as it looks
    • 14
    • PDF
    Distributed and Collaborative Malware Analysis with MASS
    • 1
    Hide and Seek: An Introduction to Steganography
    • 1,214
    Botnet protocol inference in the presence of encrypted traffic
    • 8
    • PDF
    VoIP steganography and its Detection—A survey
    • 68
    • PDF
    20 years of covert channel modeling and analysis
    • J. Millen
    • Computer Science
    • Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)
    • 1999
    • 118
    • PDF
    Hiding information in a Stream Control Transmission Protocol
    • 27
    • PDF