Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Free access

Information hiding: Challenges for forensic experts

Published: 27 December 2017 Publication History

Abstract

The practice of hiding ill-gotten data in digital objects is rising among cyber thieves. New initiatives serve to educate, train, and thwart these activities.

References

[1]
Anderson, R., Needham, R. and Shamir, A. The steganographic file system. Information Hiding. Springer, 1998, 73--82.
[2]
Backs, P., Wendzel, S. and Keller, J. Dynamic routing in covert channel overlays based on control protocols. In Proceedings of the ISTP'12 Workshop (2012). IEEE, 32--39.
[3]
Bortz, A. and Boneh, D. Exposing private information by timing web applications. In Proceedings of the WWW (2007). ACM, 621--628.
[4]
Carrara, B. and Adams, C. Out-of-band covert channels---A survey. Computing Surveys 49, 2 (2016). ACM, 23.
[5]
Caviglione, L., Podolski, M., Mazurczyk, W. and Ianigro, M. Covert channels in personal cloud storage services: The case of Dropbox. IEEE Trans. Industrial Informatics, 2016.
[6]
Cheddad, A., Condell, J., Curran, K. and Mc Kevitt, P. Digital image steganography: Survey and analysis of current methods. Signal Processing 90, 3 (Mar. 2010), 727--752.
[7]
Fisk, G., Fisk, M., Papadopoulos, C. and Neil, J. Eliminating steganography in Internet traffic with active wardens. Information Hiding, LNCS 2578 (2002). Springer, 18--35.
[8]
Fridrich, J. Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, 2009.
[9]
Girling, C.G. Covert Channels in LANs. IEEE Trans. Softw. Engin. 13, 2 (1987). IEEE, 292--296.
[10]
Gold, B.D., Linde, R.R., Peeler, R.J., Schaefer, M., Scheid, J.F. and Ward, P.D. A security retrofit of VM/370. In Proceedings of the AFIPS Conference (1979). AFIPS Press, 335--344.
[11]
Hanspach, M. and Goetz, M. On covert acoustical mesh networks in air. J. Communications 8, 11 (2013).
[12]
Hasan, R., Saxena, N., Haleviz, T., Zawoad, S. and Rinehart, D. Sensing-enabled channels for hard-to-detect command and control of mobile devices. In Proceedings of the Symp. Information, Computer and Communications Security. ACM, New York, NY, 2013, 469--480.
[13]
Herr, T. and Armbrust, E. Milware: Identification and implications of state authored malicious software. In Proceedings of the 2015 New Security Paradigms Workshop. ACM, New York, NY, 29--43
[14]
Hu, W.M. Reducing timing channels with fuzzy time. J. Computer Security 1, 3/4 (1992), 233--254.
[15]
Johnson, N.F. and Katzenbeisser, S.C. A survey of steganographic techniques. Information Hiding. Artech House, 2000.
[16]
Kemmerer, R.A. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Trans. Computer Systems 1, 3 (Aug. 1983), 256--277.
[17]
Kessler, G.C. An overview of steganography for the computer forensics examiner. Forensic Science Communications 6, 3 (Jan. 2004), 1--2.
[18]
Lampson, B.W. A note on the confinement problem. Commun. ACM 16, 10 (Oct. 1973), 613--615.
[19]
Lemay, A., Fernandez, J.M. and Knight, S. A Modbus command and control channel, In Proceedings of the Annual IEEE Systems Conference. IEEE, 2016.
[20]
Lucena, N.B., Lewandowski, G. and Chapin, S.J. Covert channels in IPv6. In Proceedings of Privacy Enhancing Technologies, LNCS 3856 (2005). Springer, 147--166.
[21]
Mazurczyk, W. and Caviglione, L. Steganography in modern smartphones and mitigation techniques. IEEE Commun. Surveys & Tutorials 17, 1 (2014), 334--357
[22]
Mazurczyk, W. and Caviglione, L. Information hiding as a challenge for malware detection. IEEE Security and Privacy, 2 (2015).
[23]
Mazurczyk, W., Wendzel, S., Zander, S., Houmansadr, A. and Szczypiorski, K. Information Hiding in Communication Networks. Wiley-IEEE Press, 2016.
[24]
Neuner, S., Voyiatzis, A.G., Schmiedecker, M., Brunthaler, S., Katzenbeisser, S. and Weippl, E.R. Time is on my side: Steganography in file system metadata. Digital Investigation 18 (2016), S76--S86.
[25]
Pang, H., Tan, K. and Zhou X. Stegfs: A steganographic file system. In Proceedings of the International Conf. on Data Engineering, 2003, 657--667.
[26]
Petitcolas, F., Anderson, R. and Kuhn, M. Information hiding---A survey. IEEE 87, 7 (1999), 1062--1078.
[27]
Rezaei, F., Hempel, M., Peng, D., Qian, Y. and Sharif, H. Analysis and evaluation of covert channels over LTE advanced. In Proceedings of the Wireless Communications and Networking Conference. IEEE, 2013, 1903--1908.
[28]
Rowland, C.H. Covert channels in the TCP/IP protocol suite. First Monday 2, 5 (1997).
[29]
Schlegel, R., Zhang, K., Zhou, X., Intwala, X., Kapadia, A., Wang, X.: Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones, in: Network and Distributed System Security Symposium, 2011.
[30]
Thompson, I. and Monroe, M. FragFS: An advanced data hiding technique. BlackHat Federal, 2006; http://www.blackhat.com/presentations/bh-federal-06/BH-Fed-06-Thompson/BH-Fed-06-Thompson-up.pdf
[31]
Tseby, T., Iglesias Vázquez, F., Bernhardt, V., Frkat, D. and Annessi, R. A network steganography lab on detecting TCP/IP covert channels. IEEE Trans. Education 59, 3 (2016), 224--232.
[32]
Wendzel, S., Kahler, B. and Rist, T. Covert channels and their prevention in building automation protocols---A prototype exemplified using BACnet. GreenCom/CPSCom. IEEE, 2012, 731--736.
[33]
Wendzel, S. and Keller, J. Hidden and Under Control---A survey and outlook on covert channel-internal control protocols. Annals of Telecommunications 69, 7 (2014). Springer, 417--430.
[34]
Wendzel, S. and Mazurczyk, W., Poster: An educational network protocol for covert channel analysis using patterns. In Proceedings of the ACM Conference on Computer and Communications Security (Vienna, Austria, Oct. 24--28, 2016), 1739--1741.
[35]
Wendzel, S., Zander, S., Fechner, B. and Herdin, C. Pattern-based survey and categorization of network covert channel techniques. Computing Surveys 47, 3 (2015). ACM, 50.
[36]
Zander, S., Armitage, G. and Branch, P. A survey of covert channels and countermeasures on computer network protocols. IEEE Communications Surveys & Tutorials 9, 3 (2007). IEEE, 44--57.
[37]
Zander, S., Armitage, G. and Branch, P. Covert channels in multiplayer first person shooter online games. . In Proceedings of the 33rd IEEE Conference on Local Computer Networks (2008), 215--222.
[38]
Zielińska, E., Mazurczyk, W. and Szczypiorski, K. Trends in steganography. Comm. ACM 57, 3 (Mar. 2014). ACM, 86--95.

Cited By

View all
  • (2024)A Novel Invisible Image Watermarking Based On The Relation Between The Selected DCT Coefficients2024 2nd International Conference on Software Engineering and Information Technology (ICoSEIT)10.1109/ICoSEIT60086.2024.10497486(108-113)Online publication date: 28-Feb-2024
  • (2024)CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioNEmerging Information Security and Applications10.1007/978-981-99-9614-8_11(164-183)Online publication date: 4-Jan-2024
  • (2023)A Survey of Steganography Tools at Layers 2-4 and HTTPProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605058(1-9)Online publication date: 29-Aug-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 61, Issue 1
January 2018
110 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/3176926
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 December 2017
Published in CACM Volume 61, Issue 1

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)570
  • Downloads (Last 6 weeks)166
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Novel Invisible Image Watermarking Based On The Relation Between The Selected DCT Coefficients2024 2nd International Conference on Software Engineering and Information Technology (ICoSEIT)10.1109/ICoSEIT60086.2024.10497486(108-113)Online publication date: 28-Feb-2024
  • (2024)CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioNEmerging Information Security and Applications10.1007/978-981-99-9614-8_11(164-183)Online publication date: 4-Jan-2024
  • (2023)A Survey of Steganography Tools at Layers 2-4 and HTTPProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605058(1-9)Online publication date: 29-Aug-2023
  • (2023)A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep LearningACM Transactions on Multimedia Computing, Communications, and Applications10.1145/357916619:6(1-23)Online publication date: 12-Jul-2023
  • (2023)LINK: Linguistic Steganalysis Framework with External KnowledgeICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)10.1109/ICASSP49357.2023.10097161(1-5)Online publication date: 4-Jun-2023
  • (2023)Removing Stegomalware from Digital Image FilesAdvances in IoT and Security with Computational Intelligence10.1007/978-981-99-5085-0_2(15-26)Online publication date: 23-Sep-2023
  • (2022)Reversible Data Hiding Algorithm for Binary Image Based on Sliding WindowProceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition10.1145/3573942.3574064(572-580)Online publication date: 23-Sep-2022
  • (2022)Web Page Harvesting for Automatized Large-scale Digital Images Anomaly DetectionProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544471(1-9)Online publication date: 23-Aug-2022
  • (2022)Feature Selection Based Universal Image Steganalysis: A Survey2022 Fifth National Conference of Saudi Computers Colleges (NCCC)10.1109/NCCC57165.2022.10067621(107-114)Online publication date: 17-Dec-2022
  • (2022)Analysis of Reversible Network Covert ChannelsIEEE Access10.1109/ACCESS.2022.316801810(41226-41238)Online publication date: 2022
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media