Information Hiding Using Minification
Authors:
- Paweł Rajba,
- Wojciech Mazurczyk
Abstract
Information hiding techniques have been recently getting increased attention from the security community. This is because attackers often apply a variety of data hiding methods to exfiltrate confidential information, enable covert transfers between the compromised victim’s machine and an attacker-operated infrastructure, or stealthily transmit additional malicious tools. Furthermore, such data concealment can be realized using different types of carriers, for instance, digital images, video, audio, text, or network traffic. Therefore, by carefully inspecting various data hiding methods, it is possible to assess the implications that such threats cause and to evaluate the preparedness of the existing defensive solutions. Minification is a popular mean for source code size reduction while preserving its complete functionality. In effect, the data transfer can be realized in a more efficient manner. Considering the above, in this paper, we systematically evaluate if the minification process can be effectively used for secret data transfer. The performed extensive experimental evaluation and obtained results indicate that the threat is real, thus countermeasures need to be adjusted accordingly.
- Record ID
- WUT1afc403073fd45a88a9b8e0a71934e12
- Author
- Journal series
- IEEE Access, ISSN 2169-3536
- Issue year
- 2021
- Vol
- 9
- Pages
- 66436-66449
- Keywords in English
- Information hiding, steganography, data hiding, network security, minification
- ASJC Classification
- ; ;
- DOI
- DOI:10.1109/access.2021.3077197 Opening in a new tab
- URL
- https://ieeexplore.ieee.org/abstract/document/9420715 Opening in a new tab
- Language
- eng (en) English
- License
- File
-
- File: 1
- Information Hiding Using Minification, File Mazurczyk_informationHiding.pdf / 2 MB
- Mazurczyk_informationHiding.pdf
- publication date: 12-05-2021
- Information Hiding Using Minification, File Mazurczyk_informationHiding.pdf / 2 MB
-
- Score (nominal)
- 100
- Score source
- journalList
- Score
- = 100.0, 05-05-2022, ArticleFromJournal
- Publication indicators
- = 2; = 0; = 2; : 2018 = 1.718; : 2020 (2 years) = 3.367 - 2020 (5 years) =3.671
- Citation count
- 3
- Uniform Resource Identifier
- https://repo.pw.edu.pl/info/article/WUT1afc403073fd45a88a9b8e0a71934e12/
- URN
urn:pw-repo:WUT1afc403073fd45a88a9b8e0a71934e12
* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or PerishOpening in a new tab system.