Information Hiding as a Challenge for Malware Detection

作者: Wojciech Mazurczyk , Luca Caviglione

DOI: 10.1109/MSP.2015.33

关键词: Computer scienceInformation hidingComputer securityWorld Wide WebMalwareCryptovirology

摘要: … Information hiding techniques are increasingly utilized by the current malware to hide its existence and communication attempts. In this paper we highlight this new trend by reviewing the most notable examples of malicious software that shows this capability. … Threats using information hiding on mobile platforms could be the next great challenge for security researchers. …

参考文章(10)
Luke Deshotels, Inaudible sound as a covert channel in mobile devices WOOT'14 Proceedings of the 8th USENIX conference on Offensive Technologies. pp. 16- 16 ,(2014)
Wade Gasior, Li Yang, Exploring Covert Channel in Android Platform Cybersecurity. pp. 173- 177 ,(2012) , 10.1109/CYBERSECURITY.2012.29
Ragib Hasan, Nitesh Saxena, Tzipora Haleviz, Shams Zawoad, Dustin Rinehart, Sensing-enabled channels for hard-to-detect command and control of mobile devices computer and communications security. pp. 469- 480 ,(2013) , 10.1145/2484313.2484373
Wade Gasior, Li Yang, Network covert channels on the Android platform cyber security and information intelligence research workshop. pp. 61- ,(2011) , 10.1145/2179298.2179367
Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici, AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies international conference on malicious and unwanted software. pp. 58- 67 ,(2014) , 10.1109/MALWARE.2014.6999418
Claudio Marforio, Hubert Ritzdorf, Aurélien Francillon, Srdjan Capkun, Analysis of the communication between colluding applications on modern smartphones Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12. pp. 51- 60 ,(2012) , 10.1145/2420950.2420958
Wojciech Mazurczyk, Luca Caviglione, Steganography in Modern Smartphones and Mitigation Techniques IEEE Communications Surveys and Tutorials. ,vol. 17, pp. 334- 357 ,(2015) , 10.1109/COMST.2014.2350994
Jean-Francois Lalande, Steffen Wendzel, Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels availability, reliability and security. pp. 701- 710 ,(2013) , 10.1109/ARES.2013.92
O. Dabeer, K. Sullivan, U. Madhow, S. Chandrasekaran, B.S. Manjunath, Detection of hiding in the least significant bit IEEE Transactions on Signal Processing. ,vol. 52, pp. 3046- 3058 ,(2004) , 10.1109/TSP.2004.833869
Apu Kapadia, Xiao-yong Zhou, Mehool Intwala, Roman Schlegel, Kehuan Zhang, XiaoFeng Wang, Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. network and distributed system security symposium. ,(2011)