Tight arms race: Overview of current malware threats and trends in their detection

L Caviglione, M Choraś, I Corona, A Janicki… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …

A revised taxonomy of steganography embedding patterns

S Wendzel, L Caviglione, W Mazurczyk… - Proceedings of the 16th …, 2021 - dl.acm.org
Steganography embraces several hiding techniques which spawn across multiple domains.
However, the related terminology is not unified among the different domains, such as digital …

The new threats of information hiding: The road ahead

K Cabaj, L Caviglione, W Mazurczyk, S Wendzel… - IT …, 2018 - ieeexplore.ieee.org
A recent trend involves exploiting various information-hiding techniques to empower
malware-for example, to bypass mobile device security frameworks or to exfiltrate sensitive …

Odini: Escaping sensitive data from faraday-caged, air-gapped computers via magnetic fields

M Guri, B Zadov, Y Elovici - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Air-gapped computers are devices that are kept isolated from the Internet, because they
store and process sensitive information. When highly sensitive data is involved, an air …

[HTML][HTML] Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels

A Mileva, A Velinov, L Hartmann, S Wendzel… - Computers & …, 2021 - Elsevier
Abstract Message Queuing Telemetry Transport (MQTT) is a publish-subscribe protocol
which is currently popular in Internet of Things (IoT) applications. Recently its 5.0 version …

Machine Learning and Software Defined Network to secure communications in a swarm of drones

C Guerber, M Royer, N Larrieu - Journal of information security and …, 2021 - Elsevier
As drones become more and more frequent in industry and perhaps tomorrow in everyday
life, the variety and sensitivity of their missions will increase. Securing the communication …

A survey on information hiding using video steganography

M Dalal, M Juneja - Artificial Intelligence Review, 2021 - Springer
In the last few decades, information security has gained huge importance owing to the
massive growth in digital communication; hence, driving steganography to the forefront for …

Magneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields

M Guri - Future Generation Computer Systems, 2021 - Elsevier
This papers shows that attackers can leak data from isolated, air-gapped computers to
nearby smartphones via covert magnetic signals. The proposed covert channel works even …

A firewall concept for both control-flow and data-flow in regression integration testing

LJ White, HKN Leung - Proceedings Conference on Software …, 1992 - computer.org
Due to improvements in defensive systems, network threats are becoming increasingly
sophisticated and complex as cybercriminals are using various methods to cloak their …

Information hiding: challenges for forensic experts

W Mazurczyk, S Wendzel - Communications of the ACM, 2017 - dl.acm.org
Information hiding: Challenges for forensic experts Page 1 86 COMMUNICATIONS OF THE
ACM | JANUARY 2018 | VOL. 61 | NO. 1 review articles IMA GE B Y ANDRIJ BOR YS A SSOCIA …