The Community for Technology Leaders
Green Image
Issue No. 03 - May./Jun. (2018 vol. 20)
ISSN: 1520-9202
pp: 31-39
Krzysztof Cabaj , Warsaw University of Technology, Poland
Luca Caviglione , National Research Council of Italy
Wojciech Mazurczyk , Warsaw University of Technology, Poland
Steffen Wendzel , Worms University of Applied Sciences, Germany
Alan Woodward , University of Surrey, UK
Sebastian Zander , Murdoch University, Australia
A recent trend involves exploiting various information-hiding techniques to empower malware-for example, to bypass mobile device security frameworks or to exfiltrate sensitive data. The authors provide an overview of information-hiding techniques that can be utilized by malware. They showcase existing and emerging threats that use different types of data-hiding mechanisms (not just those adopting classical covert channels), with the goal of monitoring these threats and proposing efficient countermeasures.
data encapsulation, invasive software
757 ms
(Ver 3.3 (11022016))