Data hiding in anti-forensics – Exploit delivery through digital steganography

GHASHI, Hans, ZARGARI, Shahrzad and JALALI, Setareh (2024). Data hiding in anti-forensics – Exploit delivery through digital steganography. In: JAHANKHANI, Hamid, (ed.) Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023. Advanced Sciences and Technologies for Security Applications (ASTSA) . Cham, Springer. [Book Section]

Documents
32747:635517
[thumbnail of RRS / version query]
PDF (RRS / version query)
Zargari-DataHidingAnti-forensics( AM ).pdf - Accepted Version
Restricted to Repository staff only until 1 January 2050.
Available under License All rights reserved.

Download (277kB)
Abstract
Developments in digital forensics investigations have occurred along with those in anti-forensics. Legal issues involving cybercrime are difficult to investigate and even more difficult to prosecute since a forensic investigator must often develop a case by examining artefacts left on a device or network. When cyber criminals became more aware of the techniques utilized in digital forensics, countermeasures to these approaches were developed. The goal of these procedures is to sabotage forensic investigations, and many of them are readily available and simple to use. The purpose of this research is to improve our understanding of these Anti-Forensic technologies by doing in-depth individual analyses and discussing the functionality and methods, as well as the possibilities of mitigation. The topic of this Anti-Forensics study is within Data Hiding; there are different ways available; however, this project focuses on a steganography tool known as Stegosploit and looks to see if embedding JPG images with malicious code without visual distortion of the image is conceivable.
More Information
Metrics

Altmetric Badge

Dimensions Badge

Share
Add to AnyAdd to TwitterAdd to FacebookAdd to LinkedinAdd to PinterestAdd to Email

Actions (login required)

View Item View Item