In recent years, the use of steganographic techniques has been progressively observed to endow threats with cloaking capabilities and to launch sophisticated attack campaigns. This requires to partially rethink the perception of malware.

Never Mind The Malware, Here's The Stegomalware

Luca Caviglione;
2022

Abstract

In recent years, the use of steganographic techniques has been progressively observed to endow threats with cloaking capabilities and to launch sophisticated attack campaigns. This requires to partially rethink the perception of malware.
2022
Istituto di Matematica Applicata e Tecnologie Informatiche - IMATI -
stegomalware
cybersecurity
information hiding
steganography
covert channels
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/429114
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact