ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1504.04867
  4. Cited By
Information Hiding as a Challenge for Malware Detection

Information Hiding as a Challenge for Malware Detection

19 April 2015
W. Mazurczyk
L. Caviglione
ArXiv (abs)PDFHTML

Papers citing "Information Hiding as a Challenge for Malware Detection"

7 / 7 papers shown
Title
CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN
CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN
Simone Soderi
R. Nicola
56
3
0
24 Apr 2024
SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables
SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables
Mordechai Guri
13
5
0
15 Jul 2022
Protocol-independent Detection of "Messaging Ordering" Network Covert
  Channels
Protocol-independent Detection of "Messaging Ordering" Network Covert Channels
S. Wendzel
21
1
0
28 Feb 2021
Countering Adaptive Network Covert Communication with Dynamic Wardens
Countering Adaptive Network Covert Communication with Dynamic Wardens
W. Mazurczyk
S. Wendzel
Mehdi Chourib
J. Keller
AAML
37
21
0
28 Feb 2021
ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers
  via Magnetic Fields
ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields
Mordechai Guri
B. Zadov
Andrey Daidakulov
Yuval Elovici
59
75
0
08 Feb 2018
The New Threats of Information Hiding: the Road Ahead
The New Threats of Information Hiding: the Road Ahead
Krzysztof Cabaj
L. Caviglione
W. Mazurczyk
S. Wendzel
Alan Woodward
S. Zander
76
96
0
02 Jan 2018
Unified Description for Network Information Hiding Methods
Unified Description for Network Information Hiding Methods
S. Wendzel
W. Mazurczyk
S. Zander
17
19
0
23 Dec 2015
1