Skip to Main Content (Press Enter)

Logo CNR
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills

UNI-FIND
Logo CNR

|

UNI-FIND

cnr.it
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills
  1. Outputs

Understanding information hiding to secure communications and to prevent exfiltration of mobile data

Chapter
Publication Date:
2017
abstract:
Information hiding techniques can implement covert channels, which are increasingly used for developing malware able to bypass the security layer of modern mobile devices or to covertly exfiltrate data. For such reason, understanding and detecting this type of threats is crucial to assess the security of modern devices and data. Unfortunately, the detection of information hiding-capable malware is a complex and poorly generalizable task, as it is tightly coupled with the specific implementation. Therefore, this chapter proposes to prevent the exfiltration of mobile data by early detecting malicious software considering the correlation of processes running on a device or anomalies in the consumed energy.
Iris type:
02.01 Contributo in volume (Capitolo o Saggio)
Keywords:
information hiding; colluding applications; energy-based attacks; artificial intelligence; neural networks
List of contributors:
Caviglione, Luca; Gaggero, Mauro
Authors of the University:
CAVIGLIONE LUCA
GAGGERO MAURO
Handle:
https://iris.cnr.it/handle/20.500.14243/326117
Book title:
Adaptive Mobile Computing: Advances in Processing Mobile Data Sets
  • Use of cookies

Powered by VIVO | Designed by Cineca | 26.5.0.0 | Sorgente dati: PREPROD (Ribaltamento disabilitato)