Tight arms race: Overview of current malware threats and trends in their detection

L Caviglione, M Choraś, I Corona, A Janicki… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …

Fansmitter: Acoustic data exfiltration from air-gapped computers via fans noise

M Guri, Y Solewicz, Y Elovici - Computers & Security, 2020 - Elsevier
Computers that contain sensitive information are often maintained in air-gapped isolation. In
this defensive measure, a computer is disconnected from the Internet-logically and …

Covert channels in personal cloud storage services: The case of Dropbox

L Caviglione, M Podolski, W Mazurczyk… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Personal storage services are one of the most popular applications based on the cloud
computing paradigm. Therefore, the analysis of possible privacy and security issues has …

Analysis of human awareness of security and privacy threats in smart environments

L Caviglione, JF Lalande, W Mazurczyk… - … 2015, Held as Part of HCI …, 2015 - Springer
Smart environments integrate Information and Communication Technologies (ICT) into
devices, vehicles, buildings and cities to offer an increased quality of life, energy efficiency …

VoIP network covert channels to enhance privacy and information sharing

J Saenger, W Mazurczyk, J Keller… - Future Generation …, 2020 - Elsevier
Abstract Information hiding is increasingly used to implement covert channels, to exfiltrate
data or to perform attacks in a stealthy manner. Another important usage deals with privacy …

Towards reversible storage network covert channels

W Mazurczyk, P Szary, S Wendzel… - Proceedings of the 14th …, 2019 - dl.acm.org
The use of network covert channels to improve privacy or support security threats has been
widely discussed in the literature. As today, the totality of works mainly focuses on how to not …

Countering adaptive network covert communication with dynamic wardens

W Mazurczyk, S Wendzel, M Chourib, J Keller - Future Generation …, 2019 - Elsevier
Network covert channels are hidden communication channels in computer networks. They
influence several factors of the cybersecurity economy. For instance, by improving the …

Hiding data in plain sight: Undetectable wireless communications through pseudo-noise asymmetric shift keying

S D'Oro, F Restuccia, T Melodia - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
Undetectable wireless transmissions are fundamental to avoid eavesdroppers or censorship
by authoritarian governments. To address this issue, wireless steganography “hides” covert …

A systematic analysis of covert channels in the network time protocol

J Hielscher, K Lamshöft, C Krätzer… - Proceedings of the 16th …, 2021 - dl.acm.org
Covert channels in network protocols are a technique aiming to hide the very existence of
secret communication in computer networks. In this work we present a systematic in-depth …

An anonymization protocol for the internet of things

L Davoli, Y Protskaya, L Veltri - 2017 International Symposium …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) is expected to pervasively interconnect billions of devices,
denoted as “smart objects”, in an Internet-like structure, which will extend the current …