The Community for Technology Leaders
Green Image
Issue No. 03 - May./Jun. (2018 vol. 20)
ISSN: 1520-9202
pp: 31-39
Krzysztof Cabaj , Warsaw University of Technology, Poland
Luca Caviglione , National Research Council of Italy
Wojciech Mazurczyk , Warsaw University of Technology, Poland
Steffen Wendzel , Worms University of Applied Sciences, Germany
Alan Woodward , University of Surrey, UK
Sebastian Zander , Murdoch University, Australia
ABSTRACT
A recent trend involves exploiting various information-hiding techniques to empower malware-for example, to bypass mobile device security frameworks or to exfiltrate sensitive data. The authors provide an overview of information-hiding techniques that can be utilized by malware. They showcase existing and emerging threats that use different types of data-hiding mechanisms (not just those adopting classical covert channels), with the goal of monitoring these threats and proposing efficient countermeasures.
INDEX TERMS
data encapsulation, invasive software
CITATION
757 ms
(Ver 3.3 (11022016))