Stegomalware: Difference between revisions
No edit summary |
No edit summary |
||
Line 3: | Line 3: | ||
The concept of Stegomalware was first introduced by Researchers in the context of [[mobile malware]] and presented at Inscrypt conference in 2014: {{cite conference |url=http://link.springer.com/chapter/10.1007/978-3-319-16745-9_27 |title=Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps |first1=Guillermo |last1=Suarez-Tangil |first2=Juan E |last2=Tapiador |first3=Pedro |last3=Peris-Lopez |year=2014 |conference=10th International Conference, Inscrypt |conference-url=http://www.inscrypt.cn/ |editor=Dongdai Lin, Moti Yung, Jianying Zhou |volume=8957 |edition= |book-title=Information Security and Cryptology |publisher=Springer International Publishing |location=Beijing, China |pages=496-515 |isbn=978-3-319-16745-9}}. |
The concept of Stegomalware was first introduced by Researchers in the context of [[mobile malware]] and presented at Inscrypt conference in 2014: {{cite conference |url=http://link.springer.com/chapter/10.1007/978-3-319-16745-9_27 |title=Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps |first1=Guillermo |last1=Suarez-Tangil |first2=Juan E |last2=Tapiador |first3=Pedro |last3=Peris-Lopez |year=2014 |conference=10th International Conference, Inscrypt |conference-url=http://www.inscrypt.cn/ |editor=Dongdai Lin, Moti Yung, Jianying Zhou |volume=8957 |edition= |book-title=Information Security and Cryptology |publisher=Springer International Publishing |location=Beijing, China |pages=496-515 |isbn=978-3-319-16745-9}}. |
||
The use of [[Steganography]] in malware was first applied to botnets communicating over probabilistically unobservable channels {{cite conference |last1=Nagaraja |first1=Shishir |last2=Houmansadr |first2=Amir |last3=Piyawongwisal |first3=Pratch |last4=Singh |first4=Vijit |last5=Agarwal |first5=Pragya |first6=Borisov |last6=Nikita |date= May 2011 |title=Stegobot: A Covert Social Network Botnet |url=http://link.springer.com/chapter/10.1007/978-3-642-24178-9_21 |publisher=Springer Berlin Heidelberg |volume=6958 |pages=299--313 |conference=13th International Conference Information Hiding |book-title=Lecture Notes in Computer Science}} and the extended to other components of malware engineering such as [[Return Oriented Programming]]{{cite conference |author=Lu, Kangjie, Siyang Xiong, and Debin Gao |title=Ropsteg: Program steganography with return oriented programming |year=2014 |conference=4th ACM conference on Data and application security and privacy}}, [[Compile Time]]{{cite journal |author=Schrittwieser, Sebastian, et al |title=Covert Computation—Hiding code in code through compile-time obfuscation |year=2014 |journal=Computers & Security}} programming, among others {{cite journal |author=Andriesse, Dennis, and Herbert Bos |title=Instruction-Level Steganography for Covert Trigger-Based Malware |year=2014 |journal=Detection of Intrusions and Malware, and Vulnerability Assessment}}. |
|||
==References== |
|||
{{reflist}} |
Revision as of 15:05, 30 January 2016
Stegomalware is a type of malware that uses Steganography to hinder detection. This type of malware operates by building a stegosystem to hide a malicious component within its resources and then extracts and executes them dynamically. It is considered one of the most sophisticated and stealthy ways of obfuscation.
The concept of Stegomalware was first introduced by Researchers in the context of mobile malware and presented at Inscrypt conference in 2014: Suarez-Tangil, Guillermo; Tapiador, Juan E; Peris-Lopez, Pedro (2014). "Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps". In Dongdai Lin, Moti Yung, Jianying Zhou (ed.). Information Security and Cryptology. 10th International Conference, Inscrypt. Vol. 8957. Beijing, China: Springer International Publishing. pp. 496–515. ISBN 978-3-319-16745-9.{{cite conference}}
: CS1 maint: multiple names: editors list (link).
The use of Steganography in malware was first applied to botnets communicating over probabilistically unobservable channels Nagaraja, Shishir; Houmansadr, Amir; Piyawongwisal, Pratch; Singh, Vijit; Agarwal, Pragya; Nikita, Borisov (May 2011). "Stegobot: A Covert Social Network Botnet". Lecture Notes in Computer Science. 13th International Conference Information Hiding. Vol. 6958. Springer Berlin Heidelberg. pp. 299--313. and the extended to other components of malware engineering such as Return Oriented ProgrammingLu, Kangjie, Siyang Xiong, and Debin Gao (2014). Ropsteg: Program steganography with return oriented programming. 4th ACM conference on Data and application security and privacy.{{cite conference}}
: CS1 maint: multiple names: authors list (link), Compile TimeSchrittwieser, Sebastian; et al. (2014). "Covert Computation—Hiding code in code through compile-time obfuscation". Computers & Security. {{cite journal}}
: Explicit use of et al. in: |author=
(help) programming, among others Andriesse, Dennis, and Herbert Bos (2014). "Instruction-Level Steganography for Covert Trigger-Based Malware". Detection of Intrusions and Malware, and Vulnerability Assessment.{{cite journal}}
: CS1 maint: multiple names: authors list (link).