Detecting evidence of steganography in android apps through program analysis
dc.contributor.advisor | Newman, Jennifer | |
dc.contributor.advisor | Guan, Yong | |
dc.contributor.advisor | Kamal, Ahmed | |
dc.contributor.advisor | Le, Wei | |
dc.contributor.advisor | Qiao, Daji | |
dc.contributor.author | Chen, Wenhao | |
dc.contributor.department | Department of Electrical and Computer Engineering | |
dc.date.accessioned | 2022-11-08T23:40:04Z | |
dc.date.available | 2022-11-08T23:40:04Z | |
dc.date.issued | 2020-12 | |
dc.date.updated | 2022-11-08T23:40:04Z | |
dc.description.abstract | Steganography is gaining popularity in recent years due to its strength in covert communication and information hiding. Image steganography apps in particular, has been steadily growing thanks to the processing power of modern smartphones that makes steganography easy to use for regular users. Although steganography is not malicious by nature, it can be a dangerous tool when used for illicit purposes such as malware, industrial espionage, or terrorist communications. Therefore it is important for digital forensics practitioners to have tools that can detect real world steganography apps and the stego images produced by such apps. However, large gap exists between academic research and practical forensics applications as existing research in steganography and malware detection has not paid attention to real world steganography apps. In this work, we aim to fill the gap by studying real world Android stego apps and developing detection methods against them. Through a preliminary study, we find that it is feasible to reverse engineer real world stego apps and use the knowledge to improve existing stego detection methods. We conduct a large scale study on the existing Android stego apps available on Google Play Store, Github, and F-Droid repositories, and discover unique embedding characteristics and algorithms that are not seen in existing academic research. Using our stego app collection, we create the first mobile stego image benchmark database which greatly improves the effectiveness of existing machine learning steganalysis methods. We propose a signature-based stego image detection method which can be highly efficient and effective in utilizing the knowledge gained from reverse engineering Android stego apps. Lastly, we develop a behavior-based stego app detection framework that can effectively detect stego apps that implement common embedding algorithms. | |
dc.format.mimetype | ||
dc.identifier.uri | https://dr.lib.iastate.edu/handle/20.500.12876/PrMBXNXz | |
dc.language.iso | en | |
dc.language.rfc3066 | en | |
dc.subject.disciplines | Computer engineering | en_US |
dc.subject.keywords | Android | en_US |
dc.subject.keywords | digital forensics | en_US |
dc.subject.keywords | steganalysis | en_US |
dc.subject.keywords | steganography | en_US |
dc.title | Detecting evidence of steganography in android apps through program analysis | |
dc.type | dissertation | en_US |
dc.type.genre | dissertation | en_US |
dspace.entity.type | Publication | |
relation.isOrgUnitOfPublication | a75a044c-d11e-44cd-af4f-dab1d83339ff | |
thesis.degree.discipline | Computer engineering | en_US |
thesis.degree.grantor | Iowa State University | en_US |
thesis.degree.level | dissertation | $ |
thesis.degree.name | Doctor of Philosophy | en_US |
File
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Chen_iastate_0097E_19232.pdf
- Size:
- 2.07 MB
- Format:
- Adobe Portable Document Format
- Description:
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 0 B
- Format:
- Item-specific license agreed upon to submission
- Description: