LT Badar, B Carminati, E Ferrari - Signal Processing, 2025 - Elsevier
Stegomalware is a malicious activity that employs steganography techniques to hide malicious code within innocent-looking files. The hidden code can then be executed to …
In this paper, we introduce a novel Dense D2C-Net, an unobtrusive display-to-camera (D2C) communication scheme that embeds and extracts additional data via visual content through …
Steganography is increasingly exploited by malware to avoid detection and to implement different advanced offensive schemes. An attack paradigm expected to become widely used …
The rise of payment details theft has led to increasing concerns regarding the security of e- commerce platforms. For the MageCart threat family, the attacks employ e-skimmers, which …
M Mundt, H Baier - International Conference on Digital Forensics and …, 2024 - Springer
Whether it is an insider or an Advanced Persistent Threat (APT), sensitive data is being stolen. This year's German Federal Office for Information Security (BSI) annual report …
An increasing number of threat actors takes advantage of information hiding techniques to prevent detection or to drop payloads containing attack routines. With the ubiquitous …
An increasing volume of malicious software exploits information hiding techniques to cloak additional attack stages or bypass frameworks enforcing security. This trend has intensified …
The exponential growth in the number of cyber threats requires sharing in a timely and efficient manner a wide range of Indicators of Compromise (IoCs), ie, fragments of forensics …
The rise of payment details theft has led to increasing concerns regarding the security of e- commerce platforms. For the MageCart threat family, the attacks employ e-skimmers, which …