Understanding Information Hiding to Secure Communications and to Prevent Exfiltration of Mobile Data

Abstract : Information hiding techniques can implement covert channels, which are increasingly used for developing malware that is able to bypass the security layer of modern mobile devices or to covertly exfiltrate data. For this reason, understanding and detecting this type of threats is crucial to assess the security of modern devices and data. Unfortunately, the detection of information hiding-capable malware is a complex and poorly generalizable task, as it is tightly coupled with the specific implementation. Therefore, this chapter proposes to prevent the exfiltration of mobile data by early detection of malicious software considering the correlation of processes running on a device or anomalies in the consumed energy.
Document type :
Book sections
Complete list of metadatas

https://hal.archives-ouvertes.fr/hal-01430804
Contributor : Jean-François Lalande <>
Submitted on : Tuesday, January 10, 2017 - 11:56:16 AM
Last modification on : Thursday, January 17, 2019 - 3:10:02 PM

Identifiers

Collections

Citation

Luca Caviglione, Mauro Gaggero, Jean-François Lalande, Wojciech Mazurczyk. Understanding Information Hiding to Secure Communications and to Prevent Exfiltration of Mobile Data. M. Migliardi, A. Merlo, B. S. Al-Haj. Adaptive Mobile Computing: Advances in Processing Mobile Data Sets, Elsevier, pp.185-202, 2017, 9780128046036. ⟨10.1016/B978-0-12-804603-6.00009-7⟩. ⟨hal-01430804⟩

Share

Metrics

Record views

170