Tight arms race: Overview of current malware threats and trends in their detection

L Caviglione, M Choraś, I Corona, A Janicki… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …

[HTML][HTML] Trends and challenges in network covert channels countermeasures

L Caviglione - Applied Sciences, 2021 - mdpi.com
Network covert channels are increasingly used to endow malware with stealthy behaviors,
for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner …

The future of digital forensics: Challenges and the road ahead

L Caviglione, S Wendzel… - IEEE Security & …, 2017 - ieeexplore.ieee.org
Today's huge volumes of data, heterogeneous information and communication
technologies, and borderless cyberinfrastructures create new challenges for security experts …

The new threats of information hiding: The road ahead

K Cabaj, L Caviglione, W Mazurczyk, S Wendzel… - IT …, 2018 - ieeexplore.ieee.org
A recent trend involves exploiting various information-hiding techniques to empower
malware-for example, to bypass mobile device security frameworks or to exfiltrate sensitive …

Cyber attack models for smart grid environments

P Eder-Neuhauser, T Zseby, J Fabini… - Sustainable Energy, Grids …, 2017 - Elsevier
Smart grids utilize communication technologies that make them vulnerable to cyber attacks.
Because the power grid is a critical infrastructure, it is a tempting target for sophisticated and …

Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence

L Caviglione, M Gaggero, JF Lalande… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Modern malware uses advanced techniques to hide from static and dynamic analysis tools.
To achieve stealthiness when attacking a mobile device, an effective approach is the use of …

Odini: Escaping sensitive data from faraday-caged, air-gapped computers via magnetic fields

M Guri, B Zadov, Y Elovici - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Air-gapped computers are devices that are kept isolated from the Internet, because they
store and process sensitive information. When highly sensitive data is involved, an air …

Magneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields

M Guri - Future Generation Computer Systems, 2021 - Elsevier
This papers shows that attackers can leak data from isolated, air-gapped computers to
nearby smartphones via covert magnetic signals. The proposed covert channel works even …

[HTML][HTML] Kernel-level tracing for detecting stegomalware and covert channels in Linux environments

L Caviglione, W Mazurczyk, M Repetto… - Computer Networks, 2021 - Elsevier
Modern malware is becoming hard to spot since attackers are increasingly adopting new
techniques to elude signature-and rule-based detection mechanisms. Among the others …

Never mind the malware, here's the stegomalware

L Caviglione, W Mazurczyk - IEEE Security & Privacy, 2022 - ieeexplore.ieee.org
Never Mind the Malware, Here’s the Stegomalware Page 1 Copublished by the
IEEE Computer and Reliability Societies September/October 2022 101 Editors: D. Balzarotti …