Steganographic information hiding that exploits a novel file system vulnerability
نویسندگان
چکیده
In this paper, we present DupeFile, a simple yet critical security vulnerability in numerous file systems. By exploiting DupeFile, adversary can store two or more files with the same name/path, with different contents, inside the same volume. Consequently, data-exfiltration exploiting DupeFile vulnerability, hereafter called DupeFile Hiding, becomes simple and easy to execute. In DupeFile Hiding, a known good file is chosen, whose name serves as the cover for hiding the malicious file. Hence we classify DupeFile Hiding as a steganography technique. This vulnerability can also be exploited for legitimate applicationshiding product license, DRM, etc. DupeFile was first uncovered on a FAT12-formatted disk on Win-98 VM. Nonetheless, the vulnerability exists in numerous file systems, including NTFS, HFS+, and HFS+ Journaled. We have developed two tools: DupeFile Detector and DupeFile Extractor for detecting and recovering hidden files respectively. We have also developed DupeFile Creator for hiding files in legitimate applications.
منابع مشابه
Duplicate File Names-A Novel Steganographic Data Hiding Technique
Data hiding has been an integral part of human society from the very early days dating back to BC. It has played its role for both good and bad purposes. First instances of data hiding dates back to 440 B.C. and has been cited in several works as one of the first known and recorded use of steganography. Several complicated Steganographic techniques have been proposed in the past decade to decei...
متن کاملAn Image High Capacity Steganographic Methods By Modified OPA Algorithm And Haar Wavelet Transform
Steganography is the art and science of hidingcommunication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. In the past, people used hidden tattoos or invisible ink to convey steganographic content. Using steganography, information can be hidden in different embedding mediums, known as carriers. These carriers can ...
متن کاملAnalysis and Implementation of Distinct Steganographic Methods
In this paper, different steganographic methods have been analyzed and implementations of those techniques have been performed. Those methods include hiding in text, hiding in audio file, hiding in file system, and hiding in image files.
متن کاملDeveloping a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate
Steganography is the approach for hiding any secret message in a variety of multimedia carriers like images, audio or video files. Whenever we are hiding a data, it is very important to make it invisible, so that it could be protected. A number of steganographic algorithms have been proposed based on this property of a steganographic system. This paper concentrates on integrating Tri way pixel ...
متن کاملEnhancing File Security by Integrating Steganography Technique in Linux Kernel
In today‟s world securing file data is very important. The proposed Secure File System (SFS) provides file data security using steganographic techniques in a transparent and convenient way. The proposed SFS pushes information hiding services into the Linux kernel space, mounting it between the Virtual File System layer and underlying file system. After SFS is integrated with the Linux operating...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJSN
دوره 8 شماره
صفحات -
تاریخ انتشار 2013