Author:
Cassavia Nunziato,Caviglione Luca,Guarascio Massimo,Liguori Angelica,Manco Giuseppe,Zuppelli Marco
Abstract
AbstractAn increasing volume of malicious software exploits information hiding techniques to cloak additional attack stages or bypass frameworks enforcing security. This trend has intensified with the growing diffusion of mobile ecosystems, and many threat actors now conceal scripts or configuration data within high-resolution icons. Even if machine learning has proven to be effective in detecting various hidden payloads, modern mobile scenarios pose further challenges in terms of scalability and privacy. In fact, applications can be retrieved from multiple stores or directly from the Web or social media. Therefore, this paper introduces an approach based on federated learning to reveal information hidden in high-resolution icons bundled with mobile applications. Specifically, multiple nodes are used to mitigate the impact of different privacy regulations, the lack of comprehensive datasets, or the computational burden arising from distributed stores and unofficial repositories. Results collected through simulations indicate that our approach achieves performances similar to those of centralized blueprints. Moreover, federated learning demonstrated its effectiveness in coping with simple “obfuscation” schemes like Base64 encoding and zip compression used by attackers to avoid detection.
Funder
Università della Calabria
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Human-Computer Interaction,Media Technology,Communication,Information Systems
Reference45 articles.
1. Almaiah MA, Al-Zahrani A, Almomani O, Alhwaitat AK (2021) Classification of cyber security threats on mobile devices and applications, pp 107–123. Springer, Cham
2. Anckaert B, De Sutter B, Chanet D, De Bosschere K (2005) Steganography for executables and code transformation signatures. In: Information security and cryptology–ICISC 2004: 7th international conference, Seoul, Korea, December 2–3, 2004, Revised Selected Papers 7, pp 425–439. Springer
3. Cassavia N, Caviglione L, Guarascio M, Manco G, Zuppelli M (2022) Detection of steganographic threats targeting digital images in heterogeneous ecosystems through machine learning. J Wireless Mobile Netw Ubiquit Comput Depend Appl 13:50–67
4. Cassavia N, Caviglione L, Guarascio M, Liguori A, Surace G., Zuppelli, M (2023) Federated learning for the efficient detection of steganographic threats hidden in image icons. In: Pervasive knowledge and collective intelligence on web and social media, pp 83–95. Springer, Cham
5. Caviglione L, Mazurczyk W (2022) Never mind the malware, here’s the stegomalware. IEEE Security Privacy 20(5):101–106