

Hijacking User Uploads to Online Persistent Data Repositories for Covert Data Exfiltration, (Paperback)
Key item features
- Hijacking User Uploads to Online Persistent Data Repositories for Covert Data Exfiltration, (Paperback)
- Author: Biblioscholar
- ISBN: 9781288332458
- Format: Paperback
- Publication Date: 2012-11-21
- Page Count: 88
Specs
- Book formatPaperback
- Fiction/nonfictionNon-Fiction
- GenreTextbooks
- Pub date20121121
- Pages88
- SubgenreGeneral
Free 30-day returns
How do you want your item?
About this item
Product details
As malware has evolved over the years, it has gone from harmless programs that copy themselves into other executables to modern day botnets that perform bank fraud and identity theft. Modern malware often has a need to communicate back to the author, or other machines that are also infected. Several techniques for transmitting this data covertly have been developed over the years which vary significantly in their level of sophistication. This research creates a new covert channel technique for stealing information from a network by piggybacking on user-generated network traffic. Specifically, steganography drop boxes and passive covert channels are merged to create a novel covert data exfiltration technique. This technique revolves around altering user supplied data being uploaded to online repositories such as image hosting websites. It specifically targets devices that are often used to generate and upload content to the Internet, such as smartphones. The reliability of this technique is tested by creating a simulated version of Flickr as well as simulating how smartphone users interact with the service. Two different algorithms for recovering the exfiltrated data are compared. The results show a clear improvement for algorithms that are user-aware. The results continue on to compare performance for varying rates of infection of mobile devices and show that performance is proportional to the infection rate.
This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.
This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.
As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
- Hijacking User Uploads to Online Persistent Data Repositories for Covert Data Exfiltration, (Paperback)
- Author: Biblioscholar
- ISBN: 9781288332458
- Format: Paperback
- Publication Date: 2012-11-21
- Page Count: 88
Specifications
Book format
Fiction/nonfiction
Genre
Pub date
Warranty
Warranty information
Similar items you might like
Based on what customers bought
Locked Up: Cybersecurity Threat Mitigation Lessons from a Real-World Lockbit Ransomware Response, (Paperback) $29.52 Was $35.10
$2952current price $29.52, Was $35.10$35.10Locked Up: Cybersecurity Threat Mitigation Lessons from a Real-World Lockbit Ransomware Response, (Paperback)
Routledge Library Edtions: Global Transp Transportation Networks: A Quantitative Treatment, (Paperback) $45.99
$4599current price $45.99Routledge Library Edtions: Global Transp Transportation Networks: A Quantitative Treatment, (Paperback)
Data Mesh: Delivering Data-Driven Value at Scale, (Paperback) $53.02
$5302current price $53.02Data Mesh: Delivering Data-Driven Value at Scale, (Paperback)
Superbloom: How Technologies of Connection Tear Us Apart, (Paperback) $18.63
$1863current price $18.63Superbloom: How Technologies of Connection Tear Us Apart, (Paperback)
Routledge Guides to Practice in Librarie Discoverability in Digital Repositories: Systems, Perspectives, and User Studies, (Paperback) $49.57
$4957current price $49.57Routledge Guides to Practice in Librarie Discoverability in Digital Repositories: Systems, Perspectives, and User Studies, (Paperback)
Defamation in the Digital Age and the 'Right to Be Forgotten', (Paperback) $44.79
$4479current price $44.79Defamation in the Digital Age and the 'Right to Be Forgotten', (Paperback)
Data Simplification: Taming Information with Open Source Tools, (Paperback) $72.87
$7287current price $72.87Data Simplification: Taming Information with Open Source Tools, (Paperback)
Data Warehouse and Data Mining: Concepts, Techniques and Real Life Applications (Paperback) $38.80
$3880current price $38.80Data Warehouse and Data Mining: Concepts, Techniques and Real Life Applications (Paperback)
Data-Centric Systems and Applications Multimedia Retrieval, (Hardcover) $35.67
$3567current price $35.67Data-Centric Systems and Applications Multimedia Retrieval, (Hardcover)
Modèle de service pour les applications Big Data dans le nuage, (Paperback) $38.00
$3800current price $38.00Modèle de service pour les applications Big Data dans le nuage, (Paperback)
Réseau Anonyme Tor 101 : Une Introduction à la Partie la Plus Privée de l'Internet (Paperback) $23.10
$2310current price $23.10Réseau Anonyme Tor 101 : Une Introduction à la Partie la Plus Privée de l'Internet (Paperback)
Big Data, Little Data, No Data : Scholarship in the Networked World (Paperback) $34.85
$3485current price $34.85Big Data, Little Data, No Data : Scholarship in the Networked World (Paperback)
Tech Enabled Lawyer: A guide to making the most of the tools you have and spotting the tech you need, (Paperback) $19.31
$1931current price $19.31Tech Enabled Lawyer: A guide to making the most of the tools you have and spotting the tech you need, (Paperback)
You've Got 8 Seconds: Communication Secrets for a Distracted World, (Paperback) $16.99 $28.80/lb
$1699current price $16.99$28.80/lbYou've Got 8 Seconds: Communication Secrets for a Distracted World, (Paperback)
Secure Searchable Encryption and Data Management, (Paperback) $28.99
$2899current price $28.99Secure Searchable Encryption and Data Management, (Paperback)
Breviarium Romanum, (Paperback) $30.95
$3095current price $30.95Breviarium Romanum, (Paperback)
Vulnerability in the Nationâ€(TM)s Homeland Security, (Hardcover) $29.95
$2995current price $29.95Vulnerability in the Nationâ(TM)s Homeland Security, (Hardcover)
Disruptive Possibilities: How Big Data Changes Everything (Paperback) $31.83
$3183current price $31.83Disruptive Possibilities: How Big Data Changes Everything (Paperback)


