Steganography in modern smartphones and mitigation techniques

W Mazurczyk, L Caviglione - IEEE Communications Surveys & …, 2014‏ - ieeexplore.ieee.org
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016‏ - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Information hiding as a challenge for malware detection

W Mazurczyk, L Caviglione - arxiv preprint arxiv:1504.04867, 2015‏ - arxiv.org
Information Hiding as a Challenge for Malware Detection Page 1 Information Hiding as a
Challenge for Malware Detection Wojciech Mazurczyk | Warsaw University of Technology …

Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence

L Caviglione, M Gaggero, JF Lalande… - IEEE Transactions …, 2015‏ - ieeexplore.ieee.org
Modern malware uses advanced techniques to hide from static and dynamic analysis tools.
To achieve stealthiness when attacking a mobile device, an effective approach is the use of …

Covert channels in personal cloud storage services: The case of Dropbox

L Caviglione, M Podolski, W Mazurczyk… - IEEE Transactions on …, 2016‏ - ieeexplore.ieee.org
Personal storage services are one of the most popular applications based on the cloud
computing paradigm. Therefore, the analysis of possible privacy and security issues has …

Towards a systematic study of the covert channel attacks in smartphones

S Chandra, Z Lin, A Kundu, L Khan - … , Revised Selected Papers, Part I 10, 2015‏ - Springer
Recently, there is a great attention on the smartphones security and privacy due to their
increasing number of users and wide range of apps. Mobile operating systems such as …

Building packet length covert channel over mobile VoIP traffics

C Liang, Y Tan, X Zhang, X Wang, J Zheng… - Journal of Network and …, 2018‏ - Elsevier
Abstract Mobile VoIP (Voice over Internet Protocol) has shown its widely prevalence and laid
the feasibility for concealed communication. VoIP contains continuous and huge amount of …

No free charge theorem: A covert channel via usb charging cable on mobile devices

R Spolaor, L Abudahi, V Moonsamy, M Conti… - … and Network Security …, 2017‏ - Springer
More and more people are regularly using mobile and battery-powered handsets, such as
smartphones and tablets. At the same time, thanks to the technological innovation and to the …

A New Sensors‐Based Covert Channel on Android

A Al-Haiqi, M Ismail, R Nordin - The Scientific World Journal, 2014‏ - Wiley Online Library
Covert channels are not new in computing systems, and have been studied since their first
definition four decades ago. New platforms invoke thorough investigations to assess their …

pcapStego: A tool for generating traffic traces for experimenting with network covert channels

M Zuppelli, L Caviglione - … of the 16th International Conference on …, 2021‏ - dl.acm.org
The increasing diffusion of malware endowed with steganographic and cloaking capabilities
requires tools and techniques for conducting research activities, testing real deployments …