Wojciech Mazurczyk

ORCID: 0000-0002-8509-4127
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Steganography and Watermarking Techniques
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • User Authentication and Security Systems
  • IPv6, Mobility, Handover, Networks, Security
  • Cryptography and Data Security
  • Spam and Phishing Detection
  • Digital and Cyber Forensics
  • Peer-to-Peer Network Technologies
  • Information and Cyber Security
  • Software-Defined Networks and 5G
  • Caching and Content Delivery
  • Mobile Ad Hoc Networks
  • Misinformation and Its Impacts
  • Advanced Authentication Protocols Security
  • Cybercrime and Law Enforcement Studies
  • Vehicular Ad Hoc Networks (VANETs)
  • Optical Wireless Communication Technologies
  • Privacy, Security, and Data Protection
  • Advanced Photonic Communication Systems
  • IoT and Edge/Fog Computing
  • Privacy-Preserving Technologies in Data

Warsaw University of Technology
2016-2025

Institute of Computer Science
2020-2024

University of Hagen
2017-2024

National Research Council
2019-2022

Istituto di Matematica Applicata e Tecnologie Informatiche
2022

Information Technology Institute
2007-2021

Polish Academy of Sciences
2021

Tecnológico de Monterrey
2021

National Institute of Technology Kurukshetra
2021

Menoufia University
2021

Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged.

10.1145/2566590.2566610 article EN Communications of the ACM 2014-02-26

Fifth generation (5G) networks are the base communication technology for connecting objects in Internet of Things (IoT) environment. 5G is being developed to provide extremely large capacity, robust integrity, high bandwidth, and low latency. With development innovating new techniques 5G-IoT, it surely will drive enormous security privacy challenges. Consequently, secure data transmissions be needed as basis 5G-IoT address these arising Therefore, various traditional mechanisms provided...

10.1109/tnsm.2020.2969863 article EN IEEE Transactions on Network and Service Management 2020-01-28

Modern malware uses advanced techniques to hide from static and dynamic analysis tools. To achieve stealthiness when attacking a mobile device, an effective approach is the use of covert channel built by two colluding applications exchange data locally. Since this process tightly coupled with used hiding method, its detection challenging task, also worsened very low transmission rates. As consequence, it important investigate how reveal presence malicious software using general indicators,...

10.1109/tifs.2015.2510825 article EN IEEE Transactions on Information Forensics and Security 2015-12-22

Currently, different forms of ransomware are increasingly threatening Internet users. Modern encrypts important user data and it is only possible to recover once a ransom has been paid. In this paper we show how Software-Defined Networking (SDN) can be utilized improve mitigation. more detail, analyze the behavior popular - CryptoWall and, based on knowledge, propose two real-time mitigation methods. Then designed SDN-based system, implemented using OpenFlow, which facilitates timely...

10.1109/mnet.2016.1600110nm article EN IEEE Network 2016-11-01

Today's huge volumes of data, heterogeneous information and communication technologies, borderless cyberinfrastructures create new challenges for security experts law enforcement agencies investigating cybercrimes. The future digital forensics is explored, with an emphasis on these the advancements needed to effectively protect modern societies pursue cybercriminals.

10.1109/msp.2017.4251117 article EN IEEE Security & Privacy 2017-11-01

By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain work. To this aim, they rely upon complex hardware/software frameworks leading to number vulnerabilities, attacks hazards profile individuals or gather sensitive information. However, majority works evaluating security degree neglects steganography, which can be mainly used to: i) exfiltrate confidential data via camouflage methods, ii) conceal...

10.1109/comst.2014.2350994 article EN IEEE Communications Surveys & Tutorials 2014-08-27

Cyber attacks are currently blooming, as the attackers reap significant profits from them and face a limited risk when compared to committing "classical" crimes. One of major components that leads successful compromising targeted system is malicious software. It allows using victim's machine for various nefarious purposes, e.g., making it part botnet, mining cryptocurrencies, or holding hostage data stored there. At present, complexity, proliferation, variety malware pose real challenge...

10.1109/access.2020.3048319 article EN cc-by IEEE Access 2020-12-30

A recent trend involves exploiting various information-hiding techniques to empower malware-for example, bypass mobile device security frameworks or exfiltrate sensitive data. The authors provide an overview of that can be utilized by malware. They showcase existing and emerging threats use different types data-hiding mechanisms (not just those adopting classical covert channels), with the goal monitoring these proposing efficient countermeasures.

10.1109/mitp.2018.032501746 article EN IT Professional 2018-05-01

Internet of Things acts an essential role in our everyday lives and it definitely has the potential to grow on importance revolutionize future. However, present communication technologies have several security related issues which is required provide secure end connectivity among services. Moreover, due recent, rapid growth quantum technologies, most common mechanisms considered today may be soon imperilled. Thus, modern during their construction also require power resist various attacks...

10.1109/access.2020.2992820 article EN cc-by IEEE Access 2020-01-01

The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in communication it is advised covert data to be compressed order limit its size. In the overt that make space steganogram. main innovation of to, chosen voice stream, find codec will result similar quality but smaller payload size than originally selected. Then, stream transcoded. At this step original intentionally unaltered and change not indicated. Instead, after...

10.1007/s11042-012-1224-8 article EN cc-by Multimedia Tools and Applications 2012-09-12

The article discusses basic principles of network steganography, which is a comparatively new research subject in the area information hiding, followed by concise overview and classification steganographic methods techniques.

10.1109/mcom.2014.6815916 article EN IEEE Communications Magazine 2014-05-01

The evolution of and countermeasures for …

10.1145/3418293 article EN Communications of the ACM 2021-02-22

10.1007/s11235-009-9245-y article EN Telecommunication Systems 2009-12-29

The practice of hiding ill-gotten data in digital objects is rising among cyber thieves. New initiatives serve to educate, train, and thwart these activities.

10.1145/3158416 article EN Communications of the ACM 2017-12-27

Malware increasingly uses information-hiding techniques to hide its existence and communication attempts. Having a better understanding of this technique could help mitigate prevent cyberattacks.

10.1109/msp.2015.33 article EN IEEE Security & Privacy 2015-03-01

Personal storage services are one of the most popular applications based on cloud computing paradigm. Therefore, analysis possible privacy and security issues has been a relevant part research agenda. However, threats arising from adoption information hiding techniques have mainly neglected. In this perspective, paper investigates how personal can be used for building covert channels stealthy exchange through Internet. To realistic use case, we consider Dropbox application present...

10.1109/tii.2016.2627503 article EN IEEE Transactions on Industrial Informatics 2016-11-09

The Internet of Things (IoT) concept has been widely adopted and connected devices enter more areas our everyday lives. However, their limited security measures raise increasing concerns, especially in terms users' privacy. That is why, this paper, privacy risks, focusing primarily on information leakage exposed by traffic fingerprinting attacks, IoT are investigated. considered attacks take advantage the statistical network flows' features application machine learning (ML) methods can be...

10.1109/access.2020.2969015 article EN cc-by IEEE Access 2020-01-01

Message Queuing Telemetry Transport (MQTT) is a publish-subscribe protocol which currently popular in Internet of Things (IoT) applications. Recently its 5.0 version has been introduced and ensuring that it capable providing services secure manner great importance. It must be noted holistic security analysis should also evaluate protocol's susceptibility to network covert channels. That why this paper we present systematic overview potential data hiding techniques can applied MQTT 5.0. We...

10.1016/j.cose.2021.102207 article EN cc-by-nc-nd Computers & Security 2021-01-22

Modern malware is becoming hard to spot since attackers are increasingly adopting new techniques elude signature- and rule-based detection mechanisms. Among the others, steganography information hiding can be used bypass security frameworks searching for suspicious communications between processes or exfiltration attempts through covert channels. Since array of potential carriers very large (e.g., hidden in hardware resources, various multimedia files network flows), detecting this class...

10.1016/j.comnet.2021.108010 article EN cc-by Computer Networks 2021-03-19

Steganography embraces several hiding techniques which spawn across multiple domains. However, the related terminology is not unified among different domains, such as digital media steganography, text cyber-physical systems network steganography (network covert channels), local channels, and out-of-band channels. To cope with this, a prime attempt has been done in 2015, introduction of so-called patterns, allow to describe more abstract manner. Despite significant enhancements, main...

10.1145/3465481.3470069 article EN Proceedings of the 17th International Conference on Availability, Reliability and Security 2021-08-16
Coming Soon ...