2023
DOI: 10.1007/s13278-023-01121-9
|View full text |Cite
|
Sign up to set email alerts
|

A federated approach for detecting data hidden in icons of mobile applications delivered via web and multiple stores

Nunziato Cassavia,
Luca Caviglione,
Massimo Guarascio
et al.

Abstract: An increasing volume of malicious software exploits information hiding techniques to cloak additional attack stages or bypass frameworks enforcing security. This trend has intensified with the growing diffusion of mobile ecosystems, and many threat actors now conceal scripts or configuration data within high-resolution icons. Even if machine learning has proven to be effective in detecting various hidden payloads, modern mobile scenarios pose further challenges in terms of scalability and privacy. In fact, app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 33 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?