Hiding Malware On Distributed Storage

被引:0
|
作者
Moubarak, Joanna [1 ]
Chamoun, Maroun [1 ]
Filiol, Eric [2 ]
机构
[1] USJ, Fac Engn, Beirut, Lebanon
[2] ESIEA, C V Lab, Laval, France
来源
2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT) | 2019年
关键词
Malware; Blockchain; Distributed storage; Swarm; IPFS; Ethereum;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Blockchain technology has been one of the major innovations in recent years. Crypto-currencies and decentralized applications are increasingly adopted. Their principles led the foundation for new ideas underlying others distributed ledger technologies (DLTs). In particular, decentralized storage employs non-recursive functions and similar algorithms compared to the Blockchain technology. Furthermore, digital signatures procedures have been used for storage validation. This paper summarizes IPFS and Swarm technologies and exposes how we managed to hide our malware on distributed storage. Our demonstration's results illustrate the possibility to hide malicious content by segregating it and reveal that decentralized storages have many concerns and lack security verification procedures.
引用
收藏
页码:720 / 725
页数:6
相关论文
共 50 条
  • [1] EvilModel: Hiding Malware Inside of Neural Network Models
    Wang, Zhi
    Liu, Chaoge
    Cui, Xiang
    26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [2] Studying the Influence of Static API Calls for Hiding Malware
    Martin, Alejandro
    Menendez, Hector D.
    Camacho, David
    ADVANCES IN ARTIFICIAL INTELLIGENCE, CAEPIA 2016, 2016, 9868 : 363 - 372
  • [3] Distributed System for Detecting the Malware in LAN
    Markowsky, George
    Savenko, Oleg
    Sachenko, Anatoliy
    2018 IEEE 13TH INTERNATIONAL SCIENTIFIC AND TECHNICAL CONFERENCE ON COMPUTER SCIENCES AND INFORMATION TECHNOLOGIES (CSIT), VOL 1, 2018, : 306 - 309
  • [4] Consortium Blockchain Distributed Storage Protocol
    Huang, Baohua
    Zheng, Huiying
    Qu, Xi
    Xie, Tongyi
    2022 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2022), 2022, : 126 - 130
  • [5] A Decentralized Architecture for Trusted Dataset Sharing Using Smart Contracts and Distributed Storage
    Pincheira, Miguel
    Donini, Elena
    Vecchio, Massimo
    Kanhere, Salil
    SENSORS, 2022, 22 (23)
  • [6] MaleficNet: Hiding Malware into Deep Neural Networks Using Spread-Spectrum Channel Coding
    Hitaj, Dorjan
    Pagnotta, Giulio
    Hitaj, Briland
    Mancini, Luigi V.
    Perez-Cruz, Fernando
    COMPUTER SECURITY - ESORICS 2022, PT III, 2022, 13556 : 425 - 444
  • [7] Architecture of Distributed Data Storage for Astroparticle Physics
    Kryukov A.P.
    Demichev A.P.
    Lobachevskii Journal of Mathematics, 2018, 39 (9) : 1199 - 1206
  • [8] Hydras and IPFS: a decentralised playground for malware
    Patsakis, Constantinos
    Casino, Fran
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (06) : 787 - 799
  • [9] Distributed Storage Allocations
    Leong, Derek
    Dimakis, Alexandros G.
    Ho, Tracey
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (07) : 4733 - 4752
  • [10] Distributed Secure Storage Scheme Based on Sharding Blockchain
    Wang, Jin
    Han, Chenchen
    Yu, Xiaofeng
    Ren, Yongjun
    Sherratt, R. Simon
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (03): : 4485 - 4502