Digital Steganography as an Advanced Malware Detection Evasion Technique

Digital Steganography as an Advanced Malware Detection Evasion Technique

Introduction

Problem Statement

Purpose

Research Questions

Significance of the Study

Theoretical Framework

Definition of Unclear Terms

Limitations

Assumptions

Literature Review

History of Digital Steganography

A Brief Explanation of How Steganography Works

Methods of Employing Digital Steganography

Legitimate Applications of Digital Steganography

Evading Malware Detection Using Digital Steganography

Countering Digital Steganography with Steganalysis

Methodology

Introduction

Research Questions

Hypothesis

Identification and Operationalization of Variables

Data Collection

Sampling Plan

Summary of Analysis Procedures

Statistical Analysis

Limitations

Results

Figure 1- Initial Attempt YouTube Error

Impact of Free Digital Steganography Software on the Internet

Impact of Criminal Malware Using Digital Steganography on the Internet

Discussion

Summary

Recommendations

References

--

--

--

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

5 Reasons Why Your Business Should Use E-Signature Software

iBG Finance

Recording podcasts via Wire on macOS

Integration between AWS Security Hub & ServiceNow

MoonSwap has completed22BURNs

How I Passed CISM Exam: Everything You Need to Know

Baidu Security Disclosed New Meltdown Variant

NoobArmy CTF Writeup

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
꧁𓊈𒆜🆉3🆁🅾🆃🆁🆄🆂🆃𒆜𓊉꧂

꧁𓊈𒆜🆉3🆁🅾🆃🆁🆄🆂🆃𒆜𓊉꧂

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

More from Medium

Security Researcher: A Road Less Frequently Traveled

A call to action: it’s time for DAOscord

Applied Explanation of the “Cyber Kill Chain” Model as a Cyber Attack Methodology

OSINT: Open Source Intelligence