Understanding Information Hiding to Secure Communications and to Prevent Exfiltration of Mobile Data - Université d'Orléans Accéder directement au contenu
Chapitre D'ouvrage Année : 2017

Understanding Information Hiding to Secure Communications and to Prevent Exfiltration of Mobile Data

Résumé

Information hiding techniques can implement covert channels, which are increasingly used for developing malware that is able to bypass the security layer of modern mobile devices or to covertly exfiltrate data. For this reason, understanding and detecting this type of threats is crucial to assess the security of modern devices and data. Unfortunately, the detection of information hiding-capable malware is a complex and poorly generalizable task, as it is tightly coupled with the specific implementation. Therefore, this chapter proposes to prevent the exfiltration of mobile data by early detection of malicious software considering the correlation of processes running on a device or anomalies in the consumed energy.
Fichier non déposé

Dates et versions

hal-01430804 , version 1 (10-01-2017)

Identifiants

Citer

Luca Caviglione, Mauro Gaggero, Jean-François Lalande, Wojciech Mazurczyk. Understanding Information Hiding to Secure Communications and to Prevent Exfiltration of Mobile Data. M. Migliardi, A. Merlo, B. S. Al-Haj. Adaptive Mobile Computing: Advances in Processing Mobile Data Sets, Elsevier, pp.185-202, 2017, 9780128046036. ⟨10.1016/B978-0-12-804603-6.00009-7⟩. ⟨hal-01430804⟩
127 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More