Keynotes

Last updated on January 15, 2024
 

Stegomalware: basics, development trends

and detection opportunities

 

 

 

 

 

 

 

 

Speaker: Wojciech Mazurczyk
Affiliation: Warsaw University

of Technology, Warsaw, Poland

https://dblp.org/pid/91/874.html

http://mazurczyk.com/
Date: TO BE ANNOUNCED

 

Abstract: Information hiding techniques are currently increasingly utilized by threat actors to elude countermeasures and prevent reversing the attack chain. Such methods are gaining popularity among attackers as they want to cloak their malicious actions from defensive systems and stay undetected for as long as possible. Currently, cybercriminals apply data hiding schemes, for example, to make their communication with the compromised machine stealthily, secretly download additional malicious components/tools, or exfiltrate confidential data. Unfortunately, detection and mitigation of threats taking advantage of information hiding pose many new challenges for digital forensics analysts, academics, law enforcement agencies, and security professionals.

During this keynote talk, the main types of data hiding techniques used by real-life malware (a.k.a. stegomalware) will be presented, and potential future development trends will be highlighted. Moreover, the main challenges that the current countermeasures face will be outlined, and the recent and novel approaches to thwart such threats will be discussed.

Keynotes

Last updated on January 15, 2024
 

Stegomalware: basics, development trends and detection opportunities

 

Speaker: Wojciech Mazurczyk
Affiliation: Warsaw University

of Technology, Warsaw, Poland

https://dblp.org/pid/91/874.html

http://mazurczyk.com/
Date: TO BE ANNOUNCED

 

Abstract: Information hiding techniques are currently increasingly utilized by threat actors to elude countermeasures and prevent reversing the attack chain. Such methods are gaining popularity among attackers as they want to cloak their malicious actions from defensive systems and stay undetected for as long as possible. Currently, cybercriminals apply data hiding schemes, for example, to make their communication with the compromised machine stealthily, secretly download additional malicious components/tools, or exfiltrate confidential data. Unfortunately, detection and mitigation of threats taking advantage of information hiding pose many new challenges for digital forensics analysts, academics, law enforcement agencies, and security professionals.

During this keynote talk, the main types of data hiding techniques used by real-life malware (a.k.a. stegomalware) will be presented, and potential future development trends will be highlighted. Moreover, the main challenges that the current countermeasures face will be outlined, and the recent and novel approaches to thwart such threats will be discussed.

Keynotes

Last updated on January 15, 2024
 

Stegomalware: basics, development trends and detection opportunities

 

Speaker: Wojciech Mazurczyk
Affiliation: Warsaw University of Technology, Warsaw, Poland

https://dblp.org/pid/91/874.html

http://mazurczyk.com/
Date: TO BE ANNOUNCED

 

Abstract: Information hiding techniques are currently increasingly utilized by threat actors to elude countermeasures and prevent reversing the attack chain. Such methods are gaining popularity among attackers as they want to cloak their malicious actions from defensive systems and stay undetected for as long as possible. Currently, cybercriminals apply data hiding schemes, for example, to make their communication with the compromised machine stealthily, secretly download additional malicious components/tools, or exfiltrate confidential data. Unfortunately, detection and mitigation of threats taking advantage of information hiding pose many new challenges for digital forensics analysts, academics, law enforcement agencies, and security professionals.

During this keynote talk, the main types of data hiding techniques used by real-life malware (a.k.a. stegomalware) will be presented, and potential future development trends will be highlighted. Moreover, the main challenges that the current countermeasures face will be outlined, and the recent and novel approaches to thwart such threats will be discussed.

Keynotes

Last updated on January 15, 2024
 

Stegomalware: basics, development trends

and detection opportunities

 

Speaker: Wojciech Mazurczyk
Affiliation: Warsaw University of Technology,

Warsaw, Poland

https://dblp.org/pid/91/874.html

http://mazurczyk.com/
Date: TO BE ANNOUNCED

 

Abstract: Information hiding techniques are currently increasingly utilized by threat actors to elude countermeasures and prevent reversing the attack chain. Such methods are gaining popularity among attackers as they want to cloak their malicious actions from defensive systems and stay undetected for as long as possible. Currently, cybercriminals apply data hiding schemes, for example, to make their communication with the compromised machine stealthily, secretly download additional malicious components/tools, or exfiltrate confidential data. Unfortunately, detection and mitigation of threats taking advantage of information hiding pose many new challenges for digital forensics analysts, academics, law enforcement agencies, and security professionals.

During this keynote talk, the main types of data hiding techniques used by real-life malware (a.k.a. stegomalware) will be presented, and potential future development trends will be highlighted. Moreover, the main challenges that the current countermeasures face will be outlined, and the recent and novel approaches to thwart such threats will be discussed.

General Chairs: esorics2024@pbs.edu.pl (general inquiries)

PC Chairs: esorics2024@telecom-sudparis.eu (submission issues)

Workshops: marek.pawlicki@pbs.edu.pl (workshop-related issues)