Speaker: Wojciech Mazurczyk
Affiliation: Warsaw University
of Technology, Warsaw, Poland
https://dblp.org/pid/91/874.html
http://mazurczyk.com/
Date: TO BE ANNOUNCED
Abstract: Information hiding techniques are currently increasingly utilized by threat actors to elude countermeasures and prevent reversing the attack chain. Such methods are gaining popularity among attackers as they want to cloak their malicious actions from defensive systems and stay undetected for as long as possible. Currently, cybercriminals apply data hiding schemes, for example, to make their communication with the compromised machine stealthily, secretly download additional malicious components/tools, or exfiltrate confidential data. Unfortunately, detection and mitigation of threats taking advantage of information hiding pose many new challenges for digital forensics analysts, academics, law enforcement agencies, and security professionals.
During this keynote talk, the main types of data hiding techniques used by real-life malware (a.k.a. stegomalware) will be presented, and potential future development trends will be highlighted. Moreover, the main challenges that the current countermeasures face will be outlined, and the recent and novel approaches to thwart such threats will be discussed.
Speaker: Wojciech Mazurczyk
Affiliation: Warsaw University
of Technology, Warsaw, Poland
https://dblp.org/pid/91/874.html
http://mazurczyk.com/
Date: TO BE ANNOUNCED
Abstract: Information hiding techniques are currently increasingly utilized by threat actors to elude countermeasures and prevent reversing the attack chain. Such methods are gaining popularity among attackers as they want to cloak their malicious actions from defensive systems and stay undetected for as long as possible. Currently, cybercriminals apply data hiding schemes, for example, to make their communication with the compromised machine stealthily, secretly download additional malicious components/tools, or exfiltrate confidential data. Unfortunately, detection and mitigation of threats taking advantage of information hiding pose many new challenges for digital forensics analysts, academics, law enforcement agencies, and security professionals.
During this keynote talk, the main types of data hiding techniques used by real-life malware (a.k.a. stegomalware) will be presented, and potential future development trends will be highlighted. Moreover, the main challenges that the current countermeasures face will be outlined, and the recent and novel approaches to thwart such threats will be discussed.
Speaker: Wojciech Mazurczyk
Affiliation: Warsaw University of Technology, Warsaw, Poland
https://dblp.org/pid/91/874.html
http://mazurczyk.com/
Date: TO BE ANNOUNCED
Abstract: Information hiding techniques are currently increasingly utilized by threat actors to elude countermeasures and prevent reversing the attack chain. Such methods are gaining popularity among attackers as they want to cloak their malicious actions from defensive systems and stay undetected for as long as possible. Currently, cybercriminals apply data hiding schemes, for example, to make their communication with the compromised machine stealthily, secretly download additional malicious components/tools, or exfiltrate confidential data. Unfortunately, detection and mitigation of threats taking advantage of information hiding pose many new challenges for digital forensics analysts, academics, law enforcement agencies, and security professionals.
During this keynote talk, the main types of data hiding techniques used by real-life malware (a.k.a. stegomalware) will be presented, and potential future development trends will be highlighted. Moreover, the main challenges that the current countermeasures face will be outlined, and the recent and novel approaches to thwart such threats will be discussed.
Speaker: Wojciech Mazurczyk
Affiliation: Warsaw University of Technology,
Warsaw, Poland
https://dblp.org/pid/91/874.html
http://mazurczyk.com/
Date: TO BE ANNOUNCED
Abstract: Information hiding techniques are currently increasingly utilized by threat actors to elude countermeasures and prevent reversing the attack chain. Such methods are gaining popularity among attackers as they want to cloak their malicious actions from defensive systems and stay undetected for as long as possible. Currently, cybercriminals apply data hiding schemes, for example, to make their communication with the compromised machine stealthily, secretly download additional malicious components/tools, or exfiltrate confidential data. Unfortunately, detection and mitigation of threats taking advantage of information hiding pose many new challenges for digital forensics analysts, academics, law enforcement agencies, and security professionals.
During this keynote talk, the main types of data hiding techniques used by real-life malware (a.k.a. stegomalware) will be presented, and potential future development trends will be highlighted. Moreover, the main challenges that the current countermeasures face will be outlined, and the recent and novel approaches to thwart such threats will be discussed.
General Chairs: esorics2024@pbs.edu.pl (general inquiries)
PC Chairs: esorics2024@telecom-sudparis.eu (submission issues)
Workshops: marek.pawlicki@pbs.edu.pl (workshop-related issues)