Malicons: Detecting Payload in Favicons

نویسندگان

  • Tomás Pevný
  • Martin Kopp
  • Jakub Kroustek
  • Andrew D. Ker
چکیده

A recent version of the “Vawtrak” malware used steganography to hide the addresses of the command and control channels in favicons: small images automatically downloaded by the web browser. Since almost all research in steganalysis focuses on natural images, we study how well these methods can detect secret messages in favicons. The study is performed on a large corpus of favicons downloaded from the internet and applies a number of state-of-art steganalysis techniques, as well as proposing very simple novel features that exploit flat areas in favicons. The ultimate question is whether we can detect Vawtrak’s steganographic favicons with a sufficiently low false positive rate.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...

متن کامل

Estimation of electro-optical payload performance

Evaluation of the performance of electro-optical payload within the laboratory is discussed. This method is valid for the system, which has output in the form of electrical signal though the input is optical in nature. The methodology enables the evaluation of entire configuration of electro-optical payload comprising of lens system, photo detecting device (one or two dimension array) and proce...

متن کامل

Network packet payload analysis for intrusion detection

This paper explores possibility of detecting intrusions into computer networks using network packet payload analysis. Quick overview of current IDS state of the art is given. Issues with IDS are explained. Integrated approach to IDS building is suggested. Anomaly detection process improvements are recomended. Current prevailing methods for network intrusion detection based on packet meta data, ...

متن کامل

Cooperative Control of Multiple Quadrotors for Transporting a Common Payload

This paper investigates the problem of controlling a team of Quadrotors that cooperatively transport a common payload. The main contribution of this study is to propose a cooperative control algorithm based on a decentralized algorithm. This strategy is comprised of two main steps: the first one is calculating the basic control vectors for each Quadrotor using Moore–Penrose theory aiming at coo...

متن کامل

An Adaptive-Robust Control Approach for Trajectory Tracking of two 5 DOF Cooperating Robot Manipulators Moving a Rigid Payload

In this paper, a dual system consisting of two 5 DOF (RRRRR) robot manipulators is considered as a cooperative robotic system used to manipulate a rigid payload on a desired trajectory between two desired initial and end positions/orientations. The forward and inverse kinematic problems are first solved for the dual arm system. Then, dynamics of the system and the relations between forces/momen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016