Bringing a gan to a knife-fight: Adapting malware communication to avoid detection

M Rigaki, S Garcia - 2018 IEEE Security and Privacy …, 2018 - ieeexplore.ieee.org
Generative Adversarial Networks (GANs) have been successfully used in a large number of
domains. This paper proposes the use of GANs for generating network traffic in order to …

DNS covert channel detection via behavioral analysis: a machine learning approach

S Saeli, F Bisio, P Lombardo, D Massa - arXiv preprint arXiv:2010.01582, 2020 - arxiv.org
Detecting covert channels among legitimate traffic represents a severe challenge due to the
high heterogeneity of networks. Therefore, we propose an effective covert channel detection …

[PDF][PDF] Stegware–using steganography for malicious purposes

S Wiseman - 2017 - researchgate.net
Stegware is the use of steganography by malware to avoid detection. It can be used to
penetrate a system, to leak sensitive information and to run a command and control channel …

Identification of LSB image steganography using cover image comparisons

M Pelosi, C Easttom - Journal of Digital Forensics, Security and …, 2021 - commons.erau.edu
Steganography has long been used to counter forensic investigation. This use of
steganography as an anti-forensics technique is becoming more widespread. This requires …

Positive identification of lsb image steganography using cover image comparisons

M Pelosi, N Poudel, P Lamichhane, D Lam, G Kessler… - 2018 - commons.erau.edu
In this paper we introduce a new software concept specifically designed to allow the digital
forensics professional to clearly identify and attribute instances of LSB image steganography …

An analysis of network steganographic malware

S Abarca - 2018 - search.proquest.com
As computer security has become more sophisticated, malware developers have
increasingly turned to steganography to evade detection. While digital media steganography …

Steganalytic methods for 3D objects

Z Li - 2018 - etheses.whiterose.ac.uk
This PhD thesis provides new research results in the area of using 3D features for
steganalysis. The research study presented in the thesis proposes new sets of 3D features …

[图书][B] A Comparative Analysis of Malware Written in the C and Rust Programming Languages

MK Praveen - 2023 - search.proquest.com
The use of malware as a tool for cybercrime has become increasingly prevalent in recent
years, resulting in significant economic losses and security threats. Conventionally, malware …

[PDF][PDF] POSITIVE IDENTIFICATION OF LEAST SIGNIFICANT BIT (LSB) IMAGE STEGANOGRAPHY USING COVER IMAGE COMPARISONS

LSBIT LSB - 199.175.52.196
Steganography has long been used to counter forensic investigation. This use of
steganography as an antiforensics technique is becoming more widespread. This requires …

What's the Deal with Stegomalware?: The Techniques, Challenges, Defence and Landscape

K Björklund - 2021 - diva-portal.org
Stegomalware is the art of hiding malicious software with steganography. Steganography is
the technique of hiding data in a seemingly innocuous carrier. The occurrence of …