The New Threats of Information Hiding: The Road Ahead

ADS

Abstract

A recent trend involves exploiting various information-hiding techniques to empower malware—for example, to bypass mobile device security frameworks or to exfiltrate sensitive data. The authors provide an overview of information-hiding techniques that can be utilized by malware. They showcase existing and emerging threats that use different types of data-hiding mechanisms (not just those adopting classical covert channels), with the goal of monitoring these threats and proposing efficient countermeasures.


Publication:

IT Professional

Pub Date:
2018
DOI:

10.1109/MITP.2018.032501746

Bibcode:
2018ITPro..20c..31C
Keywords:
  • Malware;
  • Cryptography;
  • Media;
  • Uniform resource locators;
  • Telecommunication traffic;
  • information hiding;
  • network security;
  • cybersecurity;
  • security;
  • steganography