Browse Wiki & Semantic Web

Jump to: navigation, search
Http://dbpedia.org/resource/Stegomalware
  This page has no properties.
hide properties that link here 
  No properties link to this page.
 
http://dbpedia.org/resource/Stegomalware
http://dbpedia.org/ontology/abstract Stegomalware is a type of malware that useStegomalware is a type of malware that uses steganography to hinder detection. Steganography is the practice of concealing a file, message, image, or video within another file, message, image, video or network traffic. This type of malware operates by building a steganographic system to hide malicious data within its resources and then extracts and executes them dynamically. It is considered one of the most sophisticated and stealthy ways of obfuscation. The term of `stegomalware' was introduced by researchers in the context of mobile malware and presented at Inscrypt conference in 2014. However, the fact that (mobile) malware could potentially utilize steganography was already presented in earlier works: the use of steganography in malware was first applied to botnets communicating over probabilistically unobservable channels, mobile malware based on covert channels was proposed in the same year. Steganography was later applied to other components of malware engineering such as return-oriented programming and compile-time obfuscation, among others. The Europol-supported CUING initiative monitors the use of steganography in malware.itors the use of steganography in malware.
http://dbpedia.org/ontology/wikiPageExternalLink https://cuing.eu/ +
http://dbpedia.org/ontology/wikiPageID 49268816
http://dbpedia.org/ontology/wikiPageLength 3766
http://dbpedia.org/ontology/wikiPageRevisionID 1067619223
http://dbpedia.org/ontology/wikiPageWikiLink http://dbpedia.org/resource/Malware + , http://dbpedia.org/resource/Category:Computer_security + , http://dbpedia.org/resource/Covert_channel + , http://dbpedia.org/resource/Obfuscation + , http://dbpedia.org/resource/Mobile_malware + , http://dbpedia.org/resource/Obfuscation_%28software%29 + , http://dbpedia.org/resource/Return-oriented_programming + , http://dbpedia.org/resource/Steganography +
http://dbpedia.org/property/wikiPageUsesTemplate http://dbpedia.org/resource/Template:Reflist + , http://dbpedia.org/resource/Template:More_footnotes +
http://purl.org/dc/terms/subject http://dbpedia.org/resource/Category:Computer_security +
http://purl.org/linguistics/gold/hypernym http://dbpedia.org/resource/Malware +
http://www.w3.org/ns/prov#wasDerivedFrom http://en.wikipedia.org/wiki/Stegomalware?oldid=1067619223&ns=0 +
http://xmlns.com/foaf/0.1/isPrimaryTopicOf http://en.wikipedia.org/wiki/Stegomalware +
owl:sameAs http://dbpedia.org/resource/Stegomalware + , http://www.wikidata.org/entity/Q22909076 + , https://global.dbpedia.org/id/2AUTZ +
rdfs:comment Stegomalware is a type of malware that useStegomalware is a type of malware that uses steganography to hinder detection. Steganography is the practice of concealing a file, message, image, or video within another file, message, image, video or network traffic. This type of malware operates by building a steganographic system to hide malicious data within its resources and then extracts and executes them dynamically. It is considered one of the most sophisticated and stealthy ways of obfuscation. The Europol-supported CUING initiative monitors the use of steganography in malware.itors the use of steganography in malware.
rdfs:label Stegomalware
hide properties that link here 
http://en.wikipedia.org/wiki/Stegomalware + http://xmlns.com/foaf/0.1/primaryTopic
http://dbpedia.org/resource/Stegomalware + owl:sameAs
 

 

Enter the name of the page to start semantic browsing from.