Understanding Information Hiding to Secure Communications and to Prevent Exfiltration of Mobile Data

Abstract : Information hiding techniques can implement covert channels, which are increasingly used for developing malware that is able to bypass the security layer of modern mobile devices or to covertly exfiltrate data. For this reason, understanding and detecting this type of threats is crucial to assess the security of modern devices and data. Unfortunately, the detection of information hiding-capable malware is a complex and poorly generalizable task, as it is tightly coupled with the specific implementation. Therefore, this chapter proposes to prevent the exfiltration of mobile data by early detection of malicious software considering the correlation of processes running on a device or anomalies in the consumed energy.
Type de document :
Chapitre d'ouvrage
M. Migliardi, A. Merlo, B. S. Al-Haj. Adaptive Mobile Computing: Advances in Processing Mobile Data Sets, Elsevier, pp.185-202, 2017, 9780128046036. 〈10.1016/B978-0-12-804603-6.00009-7〉
Liste complète des métadonnées

https://hal.archives-ouvertes.fr/hal-01430804
Contributeur : Jean-François Lalande <>
Soumis le : mardi 10 janvier 2017 - 11:56:16
Dernière modification le : mercredi 16 mai 2018 - 12:14:01

Identifiants

Collections

Citation

Luca Caviglione, Mauro Gaggero, Jean-François Lalande, Wojciech Mazurczyk. Understanding Information Hiding to Secure Communications and to Prevent Exfiltration of Mobile Data. M. Migliardi, A. Merlo, B. S. Al-Haj. Adaptive Mobile Computing: Advances in Processing Mobile Data Sets, Elsevier, pp.185-202, 2017, 9780128046036. 〈10.1016/B978-0-12-804603-6.00009-7〉. 〈hal-01430804〉

Partager

Métriques

Consultations de la notice

74