|
[1] F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding-a survey," Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, 1999. [2] B. W. Lampson, "A note on the confinement problem," Communications of the ACM, vol. 16, no. 10, pp. 613-615, 1973. [3] S. Nagaraja, A. Houmansadr, P. Piyawongwisal, V. Singh, P. Agarwal, and N. Borisov, "Stegobot: a covert social network botnet," in International Workshop on Information Hiding, 2011: Springer, pp. 299-313. [4] K. Singh, A. Srivastava, J. Giffin, and W. Lee, "Evaluating email’s feasibility for botnet command and control," in 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), 2008: IEEE, pp. 376-385. [5] N. Pantic and M. I. Husain, "Covert botnet command and control using twitter," in Proceedings of the 31st annual computer security applications conference, 2015, pp. 171-180. [6] A. Compagno, M. Conti, D. Lain, G. Lovisotto, and L. V. Mancini, "Boten ELISA: A novel approach for botnet C&C in online social networks," in 2015 IEEE Conference on Communications and Network Security (CNS), 2015: IEEE, pp. 74-82. [7] J. Jeon and Y. Cho, "Construction and performance analysis of image steganography-based botnet in KakaoTalk openchat," Computers, vol. 8, no. 3, p. 61, 2019. [8] M. Kwak and Y. Cho, "A novel video steganography-based botnet communication model in telegram sns messenger," Symmetry, vol. 13, no. 1, p. 84, 2021. [9] W. Fraczek and K. Szczypiorski, "Steg Blocks: Ensuring Perfect Undetectability of Network Steganography," in 2015 10th International Conference on Availability, Reliability and Security, 2015: IEEE, pp. 436-441. [10] McAfee, "McAfee Labs Threat Report," 2017. [11] E. Alparslan, A. Karahoca, and D. Karahoca, "BotNet detection: Enhancing analysis by using data mining techniques," in Advances in Data Mining Knowledge Discovery and Applications, vol. 349: IntechOpen, 2012. [12] P. Bąk, J. Bieniasz, M. Krzemiński, and K. Szczypiorski, "Application of perfectly undetectable network steganography method for malware hidden communication," in 2018 4th International Conference on Frontiers of Signal Processing (ICFSP), 2018: IEEE, pp. 34-38. [13] 維基百科. "ASCII." https://zh.wikipedia.org/wiki/ASCII. [14] StefanoDeVuono. "steghide." https://github.com/StefanoDeVuono/steghide. [15] "CryptaPix." https://www.briggsoft.com/cpix.htm. [16] 維基百科. "Blowfish." https://zh.wikipedia.org/wiki/Blowfish.
|