Tight arms race: Overview of current malware threats and trends in their detection

L Caviglione, M Choraś, I Corona, A Janicki… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …

Trends and challenges in network covert channels countermeasures

L Caviglione - Applied Sciences, 2021 - mdpi.com
Network covert channels are increasingly used to endow malware with stealthy behaviors,
for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner …

[HTML][HTML] Kernel-level tracing for detecting stegomalware and covert channels in Linux environments

L Caviglione, W Mazurczyk, M Repetto… - Computer Networks, 2021 - Elsevier
Modern malware is becoming hard to spot since attackers are increasingly adopting new
techniques to elude signature-and rule-based detection mechanisms. Among the others …

Exfiltrating data from air-gapped computers via ViBrAtIoNs

M Guri - Future Generation Computer Systems, 2021 - Elsevier
Air-gap covert channels are special types of covert communication channels that enable
attackers to exfiltrate data from isolated, network-less computers. Various types of air-gap …

Programmable data gathering for detecting stegomalware

A Carrega, L Caviglione, M Repetto… - 2020 6th IEEE …, 2020 - ieeexplore.ieee.org
The “arm race” against malware developers requires to collect a wide variety of performance
measurements, for instance to face threats leveraging information hiding and …

Reversible and plausibly deniable covert channels in one-time passwords based on hash chains

J Keller, S Wendzel - Applied Sciences, 2021 - mdpi.com
Covert channels enable stealthy communications over innocent appearing carriers. They
are increasingly applied in the network context. However, little work is available that exploits …

Covert channels in IoT deployments through data hiding techniques

L Caviglione, A Merlo… - 2018 32nd International …, 2018 - ieeexplore.ieee.org
Interconnected and always on devices are continuously and rapidly growing in number and,
according to a study from Cisco, will be three times the number of humans on earth in 2021 …

[PDF][PDF] Covert Channels in Transport Layer Security: Performance and Security Assessment.

C Heinz, M Zuppelli, L Caviglione - J. Wirel. Mob. Networks …, 2021 - academia.edu
The ability of creating covert channels within network traffic is now largely exploited by
malware to elude detection, remain unnoticed while exfiltrating data or coordinating an …

Teaching android mobile security

JF Lalande, V Viet Triem Tong, P Graux, G Hiet… - Proceedings of the 50th …, 2019 - dl.acm.org
At present, computer science studies generally offer courses addressing mobile
development and they use mobile technologies for illustrating theoretical concepts such as …

Covert channel establishment through the dynamic adaptation of the sequential probability ratio test to sensor data in IoT

JW Ho - IEEE Access, 2019 - ieeexplore.ieee.org
Owing to their hidden natures, covert channels can be utilized such that trojan applications
can communicate stealthily with each other or exchange stolen private information without …