By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, attacks and hazards to profile individuals or gather sensitive information. However, the majority of works evaluating the security degree of smartphones neglects steganography, which can be mainly used to: i) exfiltrate confidential data via camouflage methods, and ii) conceal valuable or personal information into innocent looking carriers. Therefore, this paper surveys the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014. The different approaches are grouped according to the portion of the device used to hide information, leading to three different covert channels, i.e., local, object and network. Also, it reviews the relevant approaches used to detect and mitigate steganographic attacks or threats. Lastly, it showcases the most popular software applications to embed secret data into carriers, as well as possible future directions.

Steganography in Modern Smartphones and Mitigation Techniques

Luca Caviglione;
2015

Abstract

By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, attacks and hazards to profile individuals or gather sensitive information. However, the majority of works evaluating the security degree of smartphones neglects steganography, which can be mainly used to: i) exfiltrate confidential data via camouflage methods, and ii) conceal valuable or personal information into innocent looking carriers. Therefore, this paper surveys the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014. The different approaches are grouped according to the portion of the device used to hide information, leading to three different covert channels, i.e., local, object and network. Also, it reviews the relevant approaches used to detect and mitigate steganographic attacks or threats. Lastly, it showcases the most popular software applications to embed secret data into carriers, as well as possible future directions.
2015
Istituto di Matematica Applicata e Tecnologie Informatiche - IMATI -
Istituto di Studi sui Sistemi Intelligenti per l'Automazione - ISSIA - Sede Bari
steganography
information hiding
File in questo prodotto:
File Dimensione Formato  
prod_300761-doc_90316.pdf

solo utenti autorizzati

Descrizione: Steganography in Modern Smartphones and Mitigation Techniques
Tipologia: Versione Editoriale (PDF)
Dimensione 945.96 kB
Formato Adobe PDF
945.96 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
prod_300761-doc_169391.pdf

accesso aperto

Descrizione: Steganography in Modern Smartphones and Mitigation Techniques
Tipologia: Versione Editoriale (PDF)
Dimensione 897.14 kB
Formato Adobe PDF
897.14 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/278039
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 101
  • ???jsp.display-item.citation.isi??? 65
social impact