The following text field will produce suggestions that follow it as you type.

Loading Inventory...

Coles

Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration by Curtis P Barnard, Paperback | Indigo Chapters

From Curtis P Barnard

Current price: $60.51
Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration by Curtis P Barnard, Paperback | Indigo Chapters
Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration by Curtis P Barnard, Paperback | Indigo Chapters

Coles

Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration by Curtis P Barnard, Paperback | Indigo Chapters

From Curtis P Barnard

Current price: $60.51
Loading Inventory...

Size: 0.19 x 9.69 x 0.39

Buy OnlineGet it at Coles
*Product information may vary - to confirm product availability, pricing, shipping and return information please contact Coles
As malware has evolved over the years, it has gone from harmless programs that copy themselves into other executables to modern day botnets that perform bank fraud and identity theft. Modern malware often has a need to communicate back to the author, or other machines that are also infected. Several techniques for transmitting this data covertly have been developed over the years which vary significantly in their level of sophistication. This research creates a new covert channel technique for stealing information from a network by piggybacking on user-generated network traffic. Specifically, steganography drop boxes and passive covert channels are merged to create a novel covert data exfiltration technique. This technique revolves around altering user supplied data being uploaded to online repositories such as image hosting websites. It specifically targets devices that are often used to generate and upload content to the Internet, such as smartphones. The reliability of this technique is tested by creating a simulated version of Flickr as well as simulating how smartphone users interact with the service. Two different algorithms for recovering the exfiltrated data are compared. The results show a clear improvement for algorithms that are user-aware. The results continue on to compare performance for varying rates of infection of mobile devices and show that performance is proportional to the infection rate. | Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration by Curtis P Barnard, Paperback | Indigo Chapters

More About Coles at Village Green Shopping Centre

Find everything in-store including new, used and children’s books, music, movies, games and toys. Visit Coles today to find the perfect gift, or a novel for yourself. COVID-19 UPDATE: Open | Regular Centre Hours

Powered by Adeptmind