Talks and Poster Presentations (without Proceedings-Entry):
"Covert Communication in Cyber Attacks: How attackers evade detection";
Talk: CMG-AE IT-Securitytagung,
Advanced cyber attacks require communication. Malware needs to send or receive data for information exfiltration, command and control structures or spreading to other devices. With an increasing amount of methods to detect unusual behavior in communication networks, malware communication becomes more sophisticated. Malware communication nowadays is not only encrypted and authenticated, but also uses methods to remain stealthy among standard applications, techniques to obfuscate the nature of the communication or even network steganography. The talk points out trends in malware communication and some approaches for countermeasures.
network security, hidden communication, cover channels
Created from the Publication Database of the Vienna University of Technology.