skip to main content
research-article
Free Access

Information hiding: Challenges for forensic experts

Authors Info & Claims
Published:27 December 2017Publication History
Skip Abstract Section

Abstract

The practice of hiding ill-gotten data in digital objects is rising among cyber thieves. New initiatives serve to educate, train, and thwart these activities.

References

  1. Anderson, R., Needham, R. and Shamir, A. The steganographic file system. Information Hiding. Springer, 1998, 73--82.Google ScholarGoogle Scholar
  2. Backs, P., Wendzel, S. and Keller, J. Dynamic routing in covert channel overlays based on control protocols. In Proceedings of the ISTP'12 Workshop (2012). IEEE, 32--39.Google ScholarGoogle Scholar
  3. Bortz, A. and Boneh, D. Exposing private information by timing web applications. In Proceedings of the WWW (2007). ACM, 621--628. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Carrara, B. and Adams, C. Out-of-band covert channels---A survey. Computing Surveys 49, 2 (2016). ACM, 23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Caviglione, L., Podolski, M., Mazurczyk, W. and Ianigro, M. Covert channels in personal cloud storage services: The case of Dropbox. IEEE Trans. Industrial Informatics, 2016.Google ScholarGoogle Scholar
  6. Cheddad, A., Condell, J., Curran, K. and Mc Kevitt, P. Digital image steganography: Survey and analysis of current methods. Signal Processing 90, 3 (Mar. 2010), 727--752. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Fisk, G., Fisk, M., Papadopoulos, C. and Neil, J. Eliminating steganography in Internet traffic with active wardens. Information Hiding, LNCS 2578 (2002). Springer, 18--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Fridrich, J. Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Girling, C.G. Covert Channels in LANs. IEEE Trans. Softw. Engin. 13, 2 (1987). IEEE, 292--296. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Gold, B.D., Linde, R.R., Peeler, R.J., Schaefer, M., Scheid, J.F. and Ward, P.D. A security retrofit of VM/370. In Proceedings of the AFIPS Conference (1979). AFIPS Press, 335--344.Google ScholarGoogle ScholarCross RefCross Ref
  11. Hanspach, M. and Goetz, M. On covert acoustical mesh networks in air. J. Communications 8, 11 (2013).Google ScholarGoogle ScholarCross RefCross Ref
  12. Hasan, R., Saxena, N., Haleviz, T., Zawoad, S. and Rinehart, D. Sensing-enabled channels for hard-to-detect command and control of mobile devices. In Proceedings of the Symp. Information, Computer and Communications Security. ACM, New York, NY, 2013, 469--480. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Herr, T. and Armbrust, E. Milware: Identification and implications of state authored malicious software. In Proceedings of the 2015 New Security Paradigms Workshop. ACM, New York, NY, 29--43 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Hu, W.M. Reducing timing channels with fuzzy time. J. Computer Security 1, 3/4 (1992), 233--254. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Johnson, N.F. and Katzenbeisser, S.C. A survey of steganographic techniques. Information Hiding. Artech House, 2000.Google ScholarGoogle Scholar
  16. Kemmerer, R.A. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Trans. Computer Systems 1, 3 (Aug. 1983), 256--277. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Kessler, G.C. An overview of steganography for the computer forensics examiner. Forensic Science Communications 6, 3 (Jan. 2004), 1--2.Google ScholarGoogle Scholar
  18. Lampson, B.W. A note on the confinement problem. Commun. ACM 16, 10 (Oct. 1973), 613--615. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Lemay, A., Fernandez, J.M. and Knight, S. A Modbus command and control channel, In Proceedings of the Annual IEEE Systems Conference. IEEE, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  20. Lucena, N.B., Lewandowski, G. and Chapin, S.J. Covert channels in IPv6. In Proceedings of Privacy Enhancing Technologies, LNCS 3856 (2005). Springer, 147--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Mazurczyk, W. and Caviglione, L. Steganography in modern smartphones and mitigation techniques. IEEE Commun. Surveys & Tutorials 17, 1 (2014), 334--357Google ScholarGoogle Scholar
  22. Mazurczyk, W. and Caviglione, L. Information hiding as a challenge for malware detection. IEEE Security and Privacy, 2 (2015).Google ScholarGoogle Scholar
  23. Mazurczyk, W., Wendzel, S., Zander, S., Houmansadr, A. and Szczypiorski, K. Information Hiding in Communication Networks. Wiley-IEEE Press, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Neuner, S., Voyiatzis, A.G., Schmiedecker, M., Brunthaler, S., Katzenbeisser, S. and Weippl, E.R. Time is on my side: Steganography in file system metadata. Digital Investigation 18 (2016), S76--S86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Pang, H., Tan, K. and Zhou X. Stegfs: A steganographic file system. In Proceedings of the International Conf. on Data Engineering, 2003, 657--667.Google ScholarGoogle ScholarCross RefCross Ref
  26. Petitcolas, F., Anderson, R. and Kuhn, M. Information hiding---A survey. IEEE 87, 7 (1999), 1062--1078.Google ScholarGoogle ScholarCross RefCross Ref
  27. Rezaei, F., Hempel, M., Peng, D., Qian, Y. and Sharif, H. Analysis and evaluation of covert channels over LTE advanced. In Proceedings of the Wireless Communications and Networking Conference. IEEE, 2013, 1903--1908.Google ScholarGoogle Scholar
  28. Rowland, C.H. Covert channels in the TCP/IP protocol suite. First Monday 2, 5 (1997).Google ScholarGoogle ScholarCross RefCross Ref
  29. Schlegel, R., Zhang, K., Zhou, X., Intwala, X., Kapadia, A., Wang, X.: Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones, in: Network and Distributed System Security Symposium, 2011.Google ScholarGoogle Scholar
  30. Thompson, I. and Monroe, M. FragFS: An advanced data hiding technique. BlackHat Federal, 2006; http://www.blackhat.com/presentations/bh-federal-06/BH-Fed-06-Thompson/BH-Fed-06-Thompson-up.pdfGoogle ScholarGoogle Scholar
  31. Tseby, T., Iglesias Vázquez, F., Bernhardt, V., Frkat, D. and Annessi, R. A network steganography lab on detecting TCP/IP covert channels. IEEE Trans. Education 59, 3 (2016), 224--232.Google ScholarGoogle Scholar
  32. Wendzel, S., Kahler, B. and Rist, T. Covert channels and their prevention in building automation protocols---A prototype exemplified using BACnet. GreenCom/CPSCom. IEEE, 2012, 731--736. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Wendzel, S. and Keller, J. Hidden and Under Control---A survey and outlook on covert channel-internal control protocols. Annals of Telecommunications 69, 7 (2014). Springer, 417--430.Google ScholarGoogle ScholarCross RefCross Ref
  34. Wendzel, S. and Mazurczyk, W., Poster: An educational network protocol for covert channel analysis using patterns. In Proceedings of the ACM Conference on Computer and Communications Security (Vienna, Austria, Oct. 24--28, 2016), 1739--1741. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Wendzel, S., Zander, S., Fechner, B. and Herdin, C. Pattern-based survey and categorization of network covert channel techniques. Computing Surveys 47, 3 (2015). ACM, 50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Zander, S., Armitage, G. and Branch, P. A survey of covert channels and countermeasures on computer network protocols. IEEE Communications Surveys & Tutorials 9, 3 (2007). IEEE, 44--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Zander, S., Armitage, G. and Branch, P. Covert channels in multiplayer first person shooter online games. . In Proceedings of the 33rd IEEE Conference on Local Computer Networks (2008), 215--222.Google ScholarGoogle ScholarCross RefCross Ref
  38. Zielińska, E., Mazurczyk, W. and Szczypiorski, K. Trends in steganography. Comm. ACM 57, 3 (Mar. 2014). ACM, 86--95. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Information hiding: Challenges for forensic experts

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 61, Issue 1
              January 2018
              110 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/3176926
              Issue’s Table of Contents

              Copyright © 2017 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 27 December 2017

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Popular
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format