Framework for Malware Triggering Using Steganography.
Saved in:
| Title: | Framework for Malware Triggering Using Steganography. |
|---|---|
| Authors: | Almehmadi, Lamia, Basuhail, Abdullah, Alghazzawi, Daniyal, Rabie, Osama |
| Source: | Applied Sciences (2076-3417); Aug2022, Vol. 12 Issue 16, pN.PAG-N.PAG, 23p |
| Subject Terms: | CRYPTOGRAPHY, MALWARE, COMPUTER systems, CYBERTERRORISM, INFORMATION technology security, WATERMARKS |
| Abstract: | Teaching offensive security (ethical hacking) is becoming a required component of information security curricula to develop better cybersecurity practitioners. Many academics and industry professionals believe that a good knowledge of the attacks a system can face is required to protect a system. The early detection of an attack is critical to effectively defending a system. We can't wait for threats to be discovered in the wild to begin planning our defenses. For our study, we designed and developed an offensive model that aims to remain concealed in an image until it reaches the target location. Our attack approach exploits image steganography, which involves embedding malicious code and a geolocation code into a digital image. This study aimed to discover new ways to attack computer systems and stimulate awareness of such attacks among browser developers, thus encouraging them to handle images with more care. In our experiments, both stego-image analysis and geolocation techniques are tested. Our experience has confirmed that converting indiscriminate attacks into targeted attacks is possible. [ABSTRACT FROM AUTHOR] |
| Copyright of Applied Sciences (2076-3417) is the property of MDPI and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Database: | Complementary Index |
Be the first to leave a comment!
Full Text Finder
Nájsť tento článok vo Web of Science