Tight arms race: Overview of current malware threats and trends in their detection

L Caviglione, M Choraś, I Corona, A Janicki… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …

Trends and challenges in network covert channels countermeasures

L Caviglione - Applied Sciences, 2021 - mdpi.com
Network covert channels are increasingly used to endow malware with stealthy behaviors,
for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner …

[HTML][HTML] Kernel-level tracing for detecting stegomalware and covert channels in Linux environments

L Caviglione, W Mazurczyk, M Repetto… - Computer Networks, 2021 - Elsevier
Modern malware is becoming hard to spot since attackers are increasingly adopting new
techniques to elude signature-and rule-based detection mechanisms. Among the others …

Extended berkeley packet filter: An application perspective

H Sharaf, I Ahmad, T Dimitriou - IEEE Access, 2022 - ieeexplore.ieee.org
The extended Berkeley Packet Filter (eBPF) is a lightweight and fast 64-bit RISC-like virtual
machine (VM) inside the Linux kernel. eBPF has emerged as the most promising and de …

Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges

R Chaganti, V Ravi, M Alazab, TD Pham - arXiv preprint arXiv:2110.02504, 2021 - arxiv.org
Malware distribution to the victim network is commonly performed through file attachments in
phishing email or from the internet, when the victim interacts with the source of infection. To …

bccstego: A framework for investigating network covert channels

M Repetto, L Caviglione, M Zuppelli - Proceedings of the 16th …, 2021 - dl.acm.org
Modern malware increasingly exploits information hiding to remain undetected while
attacking. To this aim, network covert channels, ie, hidden communication paths established …

pcapStego: A tool for generating traffic traces for experimenting with network covert channels

M Zuppelli, L Caviglione - … of the 16th International Conference on …, 2021 - dl.acm.org
The increasing diffusion of malware endowed with steganographic and cloaking capabilities
requires tools and techniques for conducting research activities, testing real deployments …

Code augmentation for detecting covert channels targeting the IPv6 Flow Label

L Caviglione, M Zuppelli, W Mazurczyk… - 2021 IEEE 7th …, 2021 - ieeexplore.ieee.org
Information hiding is at the basis of a new-wave of malware able to elude common detection
mechanisms or remain unnoticed for long periods. To this aim, a key approach exploits …

Detecting stegomalware: malicious image steganography and its intrusion in windows

V Verma, SK Muttoo, VB Singh - … and Data Analytics: Select Proceedings of …, 2022 - Springer
Steganography, a data hiding technique has trended into hiding the malware within digital
media, giving rise to stegomalware. Specifically, digital images pose a potential threat due to …

Covert channels in transport layer security

C Heinz, W Mazurczyk, L Caviglione - Proceedings of the 2020 …, 2020 - dl.acm.org
Network covert channels embedded within network conversations are becoming widely
adopted to enforce privacy of users or bypass censorship attempts as well as by malware to …