Covert communications: A comprehensive survey

X Chen, J An, Z Xiong, C Xing, N Zhao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …

Tight arms race: Overview of current malware threats and trends in their detection

L Caviglione, M Choraś, I Corona, A Janicki… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …

Image steganography in spatial domain: A survey

M Hussain, AWA Wahab, YIB Idris, ATS Ho… - Signal Processing: Image …, 2018 - Elsevier
This paper presents a literature review of image steganography techniques in the spatial
domain for last 5 years. The research community has already done lots of noteworthy …

[HTML][HTML] Trends and challenges in network covert channels countermeasures

L Caviglione - Applied Sciences, 2021 - mdpi.com
Network covert channels are increasingly used to endow malware with stealthy behaviors,
for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner …

Image steganography using uncorrelated color space and its application for security of visual contents in online social networks

K Muhammad, M Sajjad, I Mehmood, S Rho… - Future Generation …, 2018 - Elsevier
Image steganography is a growing research field, where sensitive contents are embedded
in images, keeping their visual quality intact. Researchers have used correlated color space …

Information hiding as a challenge for malware detection

W Mazurczyk, L Caviglione - arXiv preprint arXiv:1504.04867, 2015 - arxiv.org
Information Hiding as a Challenge for Malware Detection Page 1 Information Hiding as a
Challenge for Malware Detection Wojciech Mazurczyk | Warsaw University of Technology …

A new data hiding approach for image steganography based on visual color sensitivity

A AbdelRaouf - Multimedia Tools and Applications, 2021 - Springer
The increase of data communication globally requires secure exchange of private
information. Steganography is a common form of information hiding from an unauthorized …

A data exfiltration and remote exploitation attack on consumer 3D printers

Q Do, B Martini, KKR Choo - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
With the increased popularity of 3D printers in homes, and industry sectors, such as
biomedical and manufacturing, the potential for cybersecurity risks must be carefully …

Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence

L Caviglione, M Gaggero, JF Lalande… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Modern malware uses advanced techniques to hide from static and dynamic analysis tools.
To achieve stealthiness when attacking a mobile device, an effective approach is the use of …

ANiTW: A novel intelligent text watermarking technique for forensic identification of spurious information on social media

MT Ahvanooey, Q Li, X Zhu, M Alazab, J Zhang - Computers & Security, 2020 - Elsevier
Digital Watermarking is required in multimedia applications where access to sensitive
information has to be protected against malicious attacks. Since the digital text is one of the …