Information hiding techniques can implement covert channels, which are increasingly used for developing malware able to bypass the security layer of modern mobile devices or to covertly exfiltrate data. For such reason, understanding and detecting this type of threats is crucial to assess the security of modern devices and data. Unfortunately, the detection of information hiding-capable malware is a complex and poorly generalizable task, as it is tightly coupled with the specific implementation. Therefore, this chapter proposes to prevent the exfiltration of mobile data by early detecting malicious software considering the correlation of processes running on a device or anomalies in the consumed energy.
Understanding information hiding to secure communications and to prevent exfiltration of mobile data
L Caviglione;M Gaggero;
2017
Abstract
Information hiding techniques can implement covert channels, which are increasingly used for developing malware able to bypass the security layer of modern mobile devices or to covertly exfiltrate data. For such reason, understanding and detecting this type of threats is crucial to assess the security of modern devices and data. Unfortunately, the detection of information hiding-capable malware is a complex and poorly generalizable task, as it is tightly coupled with the specific implementation. Therefore, this chapter proposes to prevent the exfiltration of mobile data by early detecting malicious software considering the correlation of processes running on a device or anomalies in the consumed energy.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.