Tight arms race: Overview of current malware threats and trends in their detection
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …
face a limited risk when compared to committing the “classical” crimes. One of the major …
Trends and challenges in network covert channels countermeasures
L Caviglione - Applied Sciences, 2021 - mdpi.com
Network covert channels are increasingly used to endow malware with stealthy behaviors,
for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner …
for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner …
[HTML][HTML] Kernel-level tracing for detecting stegomalware and covert channels in Linux environments
Modern malware is becoming hard to spot since attackers are increasingly adopting new
techniques to elude signature-and rule-based detection mechanisms. Among the others …
techniques to elude signature-and rule-based detection mechanisms. Among the others …
Exfiltrating data from air-gapped computers via ViBrAtIoNs
M Guri - Future Generation Computer Systems, 2021 - Elsevier
Air-gap covert channels are special types of covert communication channels that enable
attackers to exfiltrate data from isolated, network-less computers. Various types of air-gap …
attackers to exfiltrate data from isolated, network-less computers. Various types of air-gap …
Programmable data gathering for detecting stegomalware
The “arm race” against malware developers requires to collect a wide variety of performance
measurements, for instance to face threats leveraging information hiding and …
measurements, for instance to face threats leveraging information hiding and …
Reversible and plausibly deniable covert channels in one-time passwords based on hash chains
J Keller, S Wendzel - Applied Sciences, 2021 - mdpi.com
Covert channels enable stealthy communications over innocent appearing carriers. They
are increasingly applied in the network context. However, little work is available that exploits …
are increasingly applied in the network context. However, little work is available that exploits …
Covert channels in IoT deployments through data hiding techniques
Interconnected and always on devices are continuously and rapidly growing in number and,
according to a study from Cisco, will be three times the number of humans on earth in 2021 …
according to a study from Cisco, will be three times the number of humans on earth in 2021 …
[PDF][PDF] Covert Channels in Transport Layer Security: Performance and Security Assessment.
The ability of creating covert channels within network traffic is now largely exploited by
malware to elude detection, remain unnoticed while exfiltrating data or coordinating an …
malware to elude detection, remain unnoticed while exfiltrating data or coordinating an …
Teaching android mobile security
At present, computer science studies generally offer courses addressing mobile
development and they use mobile technologies for illustrating theoretical concepts such as …
development and they use mobile technologies for illustrating theoretical concepts such as …
Covert channel establishment through the dynamic adaptation of the sequential probability ratio test to sensor data in IoT
JW Ho - IEEE Access, 2019 - ieeexplore.ieee.org
Owing to their hidden natures, covert channels can be utilized such that trojan applications
can communicate stealthily with each other or exchange stolen private information without …
can communicate stealthily with each other or exchange stolen private information without …