2018
DOI: 10.1109/mitp.2018.032501746
|View full text |Cite
|
Sign up to set email alerts
|

The New Threats of Information Hiding: The Road Ahead

Abstract: Compared to cryptography, steganography is a less discussed domain. However, there is a recent trend of exploiting various information hiding techniques to empower malware, for instance to bypass security frameworks of mobile devices or to exfiltrate sensitive data. This is mostly due to the need to counteract increasingly sophisticated security mechanisms, such as code analysis, runtime countermeasures, or real-time traffic inspection tools. In this perspective, this paper presents malware exploiting informat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
40
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 87 publications
(41 citation statements)
references
References 14 publications
1
40
0
Order By: Relevance
“…It can deal with the threat of information hiding that can be extracted later. Steganography technology has recently evolved into intelligent attacks that apply to various protocols such as CCTVs, smart TVs, and IoT devices [17]. These attacks are becoming a threat and can hide malicious or confidential information in files such as image, audio, and video files.…”
Section: Methods To Detect and Prevent Malicious Code From Being Hiddmentioning
confidence: 99%
“…It can deal with the threat of information hiding that can be extracted later. Steganography technology has recently evolved into intelligent attacks that apply to various protocols such as CCTVs, smart TVs, and IoT devices [17]. These attacks are becoming a threat and can hide malicious or confidential information in files such as image, audio, and video files.…”
Section: Methods To Detect and Prevent Malicious Code From Being Hiddmentioning
confidence: 99%
“…Even if applying a rule needs only 100 instructions, a core running at 2 GHz and with an IPC 4 of 1.5 cannot apply more than 30 rules. 5 While the throughput can be increased by using multiple cores for different packets, latency still will grow beyond 1 microsecond for more than 30 rules, as fine-grained parallelism by using multiple cores for different rules on a single packet will not pay off because of parallelization overhead. Thus, negative side-effects for packets with real-time requirements, such as Voice-over-IP traffic, would be the consequence.…”
Section: Resource Consumption Analysis and Impact On Legitimate Usersmentioning
confidence: 99%
“…MQTT has been heavily applied since its appearance in 1999, e.g., in Facebook Messenger, 1 Amazon IoT (a part of the Amazon Web Services), 2 OpenStack, 3 home automation platform Home Assistant, 4 Microsoft Azure IoT Hub, 5 in the FloodNet project 6 for monitoring river levels and environmental information to provide early warnings of flooding, etc. MQTT libraries are available for many programming 1 Lucy Zhang: Building Facebook Messenger, 12 August 2011.…”
Section: Mqtt Fundamentalsmentioning
confidence: 99%
“…MQTT libraries are available for many programming 1 Lucy Zhang: Building Facebook Messenger, 12 August 2011. 2 https://docs.aws.amazon.com/iot/latest/developerguide/mqtt.html 3 https://docs.openstack.org/infra/system-config/firehose.html 4 https://www.home-assistant.io/components/mqtt/ 5 https://docs.microsoft.com/en-us/azure/iot-hub/iot-hub-mqtt-support 6 http://envisense.org/floodnet/overview.htm languages and platforms, such as Java, C, C++, C#, JavaScript,.NET, etc.…”
Section: Mqtt Fundamentalsmentioning
confidence: 99%
See 1 more Smart Citation