Abstract
The practice of hiding ill-gotten data in digital objects is rising among cyber thieves. New initiatives serve to educate, train, and thwart these activities.
- Anderson, R., Needham, R. and Shamir, A. The steganographic file system. Information Hiding. Springer, 1998, 73--82.Google Scholar
- Backs, P., Wendzel, S. and Keller, J. Dynamic routing in covert channel overlays based on control protocols. In Proceedings of the ISTP'12 Workshop (2012). IEEE, 32--39.Google Scholar
- Bortz, A. and Boneh, D. Exposing private information by timing web applications. In Proceedings of the WWW (2007). ACM, 621--628. Google ScholarDigital Library
- Carrara, B. and Adams, C. Out-of-band covert channels---A survey. Computing Surveys 49, 2 (2016). ACM, 23. Google ScholarDigital Library
- Caviglione, L., Podolski, M., Mazurczyk, W. and Ianigro, M. Covert channels in personal cloud storage services: The case of Dropbox. IEEE Trans. Industrial Informatics, 2016.Google Scholar
- Cheddad, A., Condell, J., Curran, K. and Mc Kevitt, P. Digital image steganography: Survey and analysis of current methods. Signal Processing 90, 3 (Mar. 2010), 727--752. Google ScholarDigital Library
- Fisk, G., Fisk, M., Papadopoulos, C. and Neil, J. Eliminating steganography in Internet traffic with active wardens. Information Hiding, LNCS 2578 (2002). Springer, 18--35. Google ScholarDigital Library
- Fridrich, J. Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, 2009. Google ScholarDigital Library
- Girling, C.G. Covert Channels in LANs. IEEE Trans. Softw. Engin. 13, 2 (1987). IEEE, 292--296. Google ScholarDigital Library
- Gold, B.D., Linde, R.R., Peeler, R.J., Schaefer, M., Scheid, J.F. and Ward, P.D. A security retrofit of VM/370. In Proceedings of the AFIPS Conference (1979). AFIPS Press, 335--344.Google ScholarCross Ref
- Hanspach, M. and Goetz, M. On covert acoustical mesh networks in air. J. Communications 8, 11 (2013).Google ScholarCross Ref
- Hasan, R., Saxena, N., Haleviz, T., Zawoad, S. and Rinehart, D. Sensing-enabled channels for hard-to-detect command and control of mobile devices. In Proceedings of the Symp. Information, Computer and Communications Security. ACM, New York, NY, 2013, 469--480. Google ScholarDigital Library
- Herr, T. and Armbrust, E. Milware: Identification and implications of state authored malicious software. In Proceedings of the 2015 New Security Paradigms Workshop. ACM, New York, NY, 29--43 Google ScholarDigital Library
- Hu, W.M. Reducing timing channels with fuzzy time. J. Computer Security 1, 3/4 (1992), 233--254. Google ScholarDigital Library
- Johnson, N.F. and Katzenbeisser, S.C. A survey of steganographic techniques. Information Hiding. Artech House, 2000.Google Scholar
- Kemmerer, R.A. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Trans. Computer Systems 1, 3 (Aug. 1983), 256--277. Google ScholarDigital Library
- Kessler, G.C. An overview of steganography for the computer forensics examiner. Forensic Science Communications 6, 3 (Jan. 2004), 1--2.Google Scholar
- Lampson, B.W. A note on the confinement problem. Commun. ACM 16, 10 (Oct. 1973), 613--615. Google ScholarDigital Library
- Lemay, A., Fernandez, J.M. and Knight, S. A Modbus command and control channel, In Proceedings of the Annual IEEE Systems Conference. IEEE, 2016.Google ScholarCross Ref
- Lucena, N.B., Lewandowski, G. and Chapin, S.J. Covert channels in IPv6. In Proceedings of Privacy Enhancing Technologies, LNCS 3856 (2005). Springer, 147--166. Google ScholarDigital Library
- Mazurczyk, W. and Caviglione, L. Steganography in modern smartphones and mitigation techniques. IEEE Commun. Surveys & Tutorials 17, 1 (2014), 334--357Google Scholar
- Mazurczyk, W. and Caviglione, L. Information hiding as a challenge for malware detection. IEEE Security and Privacy, 2 (2015).Google Scholar
- Mazurczyk, W., Wendzel, S., Zander, S., Houmansadr, A. and Szczypiorski, K. Information Hiding in Communication Networks. Wiley-IEEE Press, 2016. Google ScholarDigital Library
- Neuner, S., Voyiatzis, A.G., Schmiedecker, M., Brunthaler, S., Katzenbeisser, S. and Weippl, E.R. Time is on my side: Steganography in file system metadata. Digital Investigation 18 (2016), S76--S86. Google ScholarDigital Library
- Pang, H., Tan, K. and Zhou X. Stegfs: A steganographic file system. In Proceedings of the International Conf. on Data Engineering, 2003, 657--667.Google ScholarCross Ref
- Petitcolas, F., Anderson, R. and Kuhn, M. Information hiding---A survey. IEEE 87, 7 (1999), 1062--1078.Google ScholarCross Ref
- Rezaei, F., Hempel, M., Peng, D., Qian, Y. and Sharif, H. Analysis and evaluation of covert channels over LTE advanced. In Proceedings of the Wireless Communications and Networking Conference. IEEE, 2013, 1903--1908.Google Scholar
- Rowland, C.H. Covert channels in the TCP/IP protocol suite. First Monday 2, 5 (1997).Google ScholarCross Ref
- Schlegel, R., Zhang, K., Zhou, X., Intwala, X., Kapadia, A., Wang, X.: Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones, in: Network and Distributed System Security Symposium, 2011.Google Scholar
- Thompson, I. and Monroe, M. FragFS: An advanced data hiding technique. BlackHat Federal, 2006; http://www.blackhat.com/presentations/bh-federal-06/BH-Fed-06-Thompson/BH-Fed-06-Thompson-up.pdfGoogle Scholar
- Tseby, T., Iglesias Vázquez, F., Bernhardt, V., Frkat, D. and Annessi, R. A network steganography lab on detecting TCP/IP covert channels. IEEE Trans. Education 59, 3 (2016), 224--232.Google Scholar
- Wendzel, S., Kahler, B. and Rist, T. Covert channels and their prevention in building automation protocols---A prototype exemplified using BACnet. GreenCom/CPSCom. IEEE, 2012, 731--736. Google ScholarDigital Library
- Wendzel, S. and Keller, J. Hidden and Under Control---A survey and outlook on covert channel-internal control protocols. Annals of Telecommunications 69, 7 (2014). Springer, 417--430.Google ScholarCross Ref
- Wendzel, S. and Mazurczyk, W., Poster: An educational network protocol for covert channel analysis using patterns. In Proceedings of the ACM Conference on Computer and Communications Security (Vienna, Austria, Oct. 24--28, 2016), 1739--1741. Google ScholarDigital Library
- Wendzel, S., Zander, S., Fechner, B. and Herdin, C. Pattern-based survey and categorization of network covert channel techniques. Computing Surveys 47, 3 (2015). ACM, 50. Google ScholarDigital Library
- Zander, S., Armitage, G. and Branch, P. A survey of covert channels and countermeasures on computer network protocols. IEEE Communications Surveys & Tutorials 9, 3 (2007). IEEE, 44--57. Google ScholarDigital Library
- Zander, S., Armitage, G. and Branch, P. Covert channels in multiplayer first person shooter online games. . In Proceedings of the 33rd IEEE Conference on Local Computer Networks (2008), 215--222.Google ScholarCross Ref
- Zielińska, E., Mazurczyk, W. and Szczypiorski, K. Trends in steganography. Comm. ACM 57, 3 (Mar. 2014). ACM, 86--95. Google ScholarDigital Library
Index Terms
- Information hiding: Challenges for forensic experts
Recommendations
Hiding Information Employing Reduplicating Embedding
APSCC '08: Proceedings of the 2008 IEEE Asia-Pacific Services Computing ConferenceIn this paper, a novel data hiding method employing reduplicating embedding is proposed. This method uses seven most significant bits to embed two secret digits and sets the least significant bit as an indicator. Therefore, two secret digits can be ...
Hiding clinical information in medical images
Display Omitted Implementation and successful usage of Pixel to Block conversion technique (PTB) for high capacity.Computationally efficient mechanism for generating cover image from input image.Block checksum computation and it's use for tamper ...
Comments