A comprehensive survey on stegomalware detection in digital media, research challenges and future directions

LT Badar, B Carminati, E Ferrari - Signal Processing, 2025 - Elsevier
Stegomalware is a malicious activity that employs steganography techniques to hide
malicious code within innocent-looking files. The hidden code can then be executed to …

Learning autoencoder ensembles for detecting malware hidden communications in IoT ecosystems

N Cassavia, L Caviglione, M Guarascio… - Journal of Intelligent …, 2024 - Springer
Modern IoT ecosystems are the preferred target of threat actors wanting to incorporate
resource-constrained devices within a botnet or leak sensitive information. A major research …

[PDF][PDF] An ensemble model to detect packet length covert channels.

MA Elsadig, A Gafar - … of Electrical & Computer Engineering (2088 …, 2023 - researchgate.net
Covert channel techniques have enriched the way to commit dangerous and unwatched
attacks. They exploit ways that are not intended to convey information; therefore, traditional …

Robust anomaly detection via adversarial counterfactual generation

A Liguori, E Ritacco, FS Pisani, G Manco - Knowledge and Information …, 2024 - Springer
The capability to devise robust outlier and anomaly detection tools is an important research
topic in machine learning and data mining. Recent techniques have been focusing on …

A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning

J Schymiczek, T Schmidbauer, S Wendzel - Proceedings of the 19th …, 2024 - dl.acm.org
Reversible network covert channels restore the original carrier object before forwarding it to
the overt receiver, drawing them a security threat hard to detect. Some of these covert …

[PDF][PDF] Using AI to face covert attacks in IoT and softwarized scenarios: challenges and opportunities.

A Liguori, S Mungari, M Zuppelli, C Comito… - Ital-IA, 2023 - ceur-ws.org
Recently, the number of attacks aiming at breaching networked and softwarized
environments has been growing exponentially. In particular, information hiding methods and …