- Internet Traffic Analysis and Secure E-voting
- Advanced Steganography and Watermarking Techniques
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Chaos-based Image/Signal Encryption
- Digital Media Forensic Detection
- User Authentication and Security Systems
- IPv6, Mobility, Handover, Networks, Security
- Cryptography and Data Security
- Spam and Phishing Detection
- Digital and Cyber Forensics
- Peer-to-Peer Network Technologies
- Information and Cyber Security
- Software-Defined Networks and 5G
- Caching and Content Delivery
- Mobile Ad Hoc Networks
- Misinformation and Its Impacts
- Advanced Authentication Protocols Security
- Cybercrime and Law Enforcement Studies
- Vehicular Ad Hoc Networks (VANETs)
- Optical Wireless Communication Technologies
- Privacy, Security, and Data Protection
- Advanced Photonic Communication Systems
- IoT and Edge/Fog Computing
- Privacy-Preserving Technologies in Data
Warsaw University of Technology
2016-2025
Institute of Computer Science
2020-2024
University of Hagen
2017-2024
National Research Council
2019-2022
Istituto di Matematica Applicata e Tecnologie Informatiche
2022
Information Technology Institute
2007-2021
Polish Academy of Sciences
2021
Tecnológico de Monterrey
2021
National Institute of Technology Kurukshetra
2021
Menoufia University
2021
Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged.
Fifth generation (5G) networks are the base communication technology for connecting objects in Internet of Things (IoT) environment. 5G is being developed to provide extremely large capacity, robust integrity, high bandwidth, and low latency. With development innovating new techniques 5G-IoT, it surely will drive enormous security privacy challenges. Consequently, secure data transmissions be needed as basis 5G-IoT address these arising Therefore, various traditional mechanisms provided...
Modern malware uses advanced techniques to hide from static and dynamic analysis tools. To achieve stealthiness when attacking a mobile device, an effective approach is the use of covert channel built by two colluding applications exchange data locally. Since this process tightly coupled with used hiding method, its detection challenging task, also worsened very low transmission rates. As consequence, it important investigate how reveal presence malicious software using general indicators,...
Currently, different forms of ransomware are increasingly threatening Internet users. Modern encrypts important user data and it is only possible to recover once a ransom has been paid. In this paper we show how Software-Defined Networking (SDN) can be utilized improve mitigation. more detail, analyze the behavior popular - CryptoWall and, based on knowledge, propose two real-time mitigation methods. Then designed SDN-based system, implemented using OpenFlow, which facilitates timely...
Today's huge volumes of data, heterogeneous information and communication technologies, borderless cyberinfrastructures create new challenges for security experts law enforcement agencies investigating cybercrimes. The future digital forensics is explored, with an emphasis on these the advancements needed to effectively protect modern societies pursue cybercriminals.
By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain work. To this aim, they rely upon complex hardware/software frameworks leading to number vulnerabilities, attacks hazards profile individuals or gather sensitive information. However, majority works evaluating security degree neglects steganography, which can be mainly used to: i) exfiltrate confidential data via camouflage methods, ii) conceal...
Cyber attacks are currently blooming, as the attackers reap significant profits from them and face a limited risk when compared to committing "classical" crimes. One of major components that leads successful compromising targeted system is malicious software. It allows using victim's machine for various nefarious purposes, e.g., making it part botnet, mining cryptocurrencies, or holding hostage data stored there. At present, complexity, proliferation, variety malware pose real challenge...
A recent trend involves exploiting various information-hiding techniques to empower malware-for example, bypass mobile device security frameworks or exfiltrate sensitive data. The authors provide an overview of that can be utilized by malware. They showcase existing and emerging threats use different types data-hiding mechanisms (not just those adopting classical covert channels), with the goal monitoring these proposing efficient countermeasures.
Internet of Things acts an essential role in our everyday lives and it definitely has the potential to grow on importance revolutionize future. However, present communication technologies have several security related issues which is required provide secure end connectivity among services. Moreover, due recent, rapid growth quantum technologies, most common mechanisms considered today may be soon imperilled. Thus, modern during their construction also require power resist various attacks...
The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in communication it is advised covert data to be compressed order limit its size. In the overt that make space steganogram. main innovation of to, chosen voice stream, find codec will result similar quality but smaller payload size than originally selected. Then, stream transcoded. At this step original intentionally unaltered and change not indicated. Instead, after...
The article discusses basic principles of network steganography, which is a comparatively new research subject in the area information hiding, followed by concise overview and classification steganographic methods techniques.
The evolution of and countermeasures for …
The practice of hiding ill-gotten data in digital objects is rising among cyber thieves. New initiatives serve to educate, train, and thwart these activities.
Malware increasingly uses information-hiding techniques to hide its existence and communication attempts. Having a better understanding of this technique could help mitigate prevent cyberattacks.
Personal storage services are one of the most popular applications based on cloud computing paradigm. Therefore, analysis possible privacy and security issues has been a relevant part research agenda. However, threats arising from adoption information hiding techniques have mainly neglected. In this perspective, paper investigates how personal can be used for building covert channels stealthy exchange through Internet. To realistic use case, we consider Dropbox application present...
The Internet of Things (IoT) concept has been widely adopted and connected devices enter more areas our everyday lives. However, their limited security measures raise increasing concerns, especially in terms users' privacy. That is why, this paper, privacy risks, focusing primarily on information leakage exposed by traffic fingerprinting attacks, IoT are investigated. considered attacks take advantage the statistical network flows' features application machine learning (ML) methods can be...
Message Queuing Telemetry Transport (MQTT) is a publish-subscribe protocol which currently popular in Internet of Things (IoT) applications. Recently its 5.0 version has been introduced and ensuring that it capable providing services secure manner great importance. It must be noted holistic security analysis should also evaluate protocol's susceptibility to network covert channels. That why this paper we present systematic overview potential data hiding techniques can applied MQTT 5.0. We...
Modern malware is becoming hard to spot since attackers are increasingly adopting new techniques elude signature- and rule-based detection mechanisms. Among the others, steganography information hiding can be used bypass security frameworks searching for suspicious communications between processes or exfiltration attempts through covert channels. Since array of potential carriers very large (e.g., hidden in hardware resources, various multimedia files network flows), detecting this class...
Steganography embraces several hiding techniques which spawn across multiple domains. However, the related terminology is not unified among different domains, such as digital media steganography, text cyber-physical systems network steganography (network covert channels), local channels, and out-of-band channels. To cope with this, a prime attempt has been done in 2015, introduction of so-called patterns, allow to describe more abstract manner. Despite significant enhancements, main...