Conference item icon

Conference item

Malicons: detecting payload in favicons

Abstract:

A recent version of the “Vawtrak” malware used steganography to hide the addresses of the command and control channels in favicons: small images automatically downloaded by the web browser. Since almost all research in steganalysis focuses on natural images, we study how well these methods can detect secret messages in favicons. The study is performed on a large corpus of favicons downloaded from the internet and applies a number of state-of-art steganalysis techniques, as well as proposing v...

Expand abstract
Publication status:
Published
Peer review status:
Peer reviewed

Actions


Access Document


Files:
Publisher copy:
10.2352/ISSN.2470-1173.2016.8.MWSF-079

Authors


More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Role:
Author
Publisher:
Ingentaconnect
Host title:
Electronic Imaging: Media Watermarking, Security, and Forensics 2016
Journal:
Electronic Imaging: Media Watermarking, Security, and Forensics 2016 More from this journal
Issue:
2016
Pages:
1-9
Publication date:
2016-02-14
DOI:
Pubs id:
pubs:602187
UUID:
uuid:895a0272-412f-4a64-ba07-70c2c497dd88
Local pid:
pubs:602187
Source identifiers:
602187
Deposit date:
2016-02-13

Terms of use


Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP