Detecting evidence of steganography in android apps through program analysis

dc.contributor.advisor Newman, Jennifer
dc.contributor.advisor Guan, Yong
dc.contributor.advisor Kamal, Ahmed
dc.contributor.advisor Le, Wei
dc.contributor.advisor Qiao, Daji
dc.contributor.author Chen, Wenhao
dc.contributor.department Department of Electrical and Computer Engineering
dc.date.accessioned 2022-11-08T23:40:04Z
dc.date.available 2022-11-08T23:40:04Z
dc.date.issued 2020-12
dc.date.updated 2022-11-08T23:40:04Z
dc.description.abstract Steganography is gaining popularity in recent years due to its strength in covert communication and information hiding. Image steganography apps in particular, has been steadily growing thanks to the processing power of modern smartphones that makes steganography easy to use for regular users. Although steganography is not malicious by nature, it can be a dangerous tool when used for illicit purposes such as malware, industrial espionage, or terrorist communications. Therefore it is important for digital forensics practitioners to have tools that can detect real world steganography apps and the stego images produced by such apps. However, large gap exists between academic research and practical forensics applications as existing research in steganography and malware detection has not paid attention to real world steganography apps. In this work, we aim to fill the gap by studying real world Android stego apps and developing detection methods against them. Through a preliminary study, we find that it is feasible to reverse engineer real world stego apps and use the knowledge to improve existing stego detection methods. We conduct a large scale study on the existing Android stego apps available on Google Play Store, Github, and F-Droid repositories, and discover unique embedding characteristics and algorithms that are not seen in existing academic research. Using our stego app collection, we create the first mobile stego image benchmark database which greatly improves the effectiveness of existing machine learning steganalysis methods. We propose a signature-based stego image detection method which can be highly efficient and effective in utilizing the knowledge gained from reverse engineering Android stego apps. Lastly, we develop a behavior-based stego app detection framework that can effectively detect stego apps that implement common embedding algorithms.
dc.format.mimetype PDF
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/PrMBXNXz
dc.language.iso en
dc.language.rfc3066 en
dc.subject.disciplines Computer engineering en_US
dc.subject.keywords Android en_US
dc.subject.keywords digital forensics en_US
dc.subject.keywords steganalysis en_US
dc.subject.keywords steganography en_US
dc.title Detecting evidence of steganography in android apps through program analysis
dc.type dissertation en_US
dc.type.genre dissertation en_US
dspace.entity.type Publication
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
thesis.degree.discipline Computer engineering en_US
thesis.degree.grantor Iowa State University en_US
thesis.degree.level dissertation $
thesis.degree.name Doctor of Philosophy en_US
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Chen_iastate_0097E_19232.pdf
Size:
2.07 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
0 B
Format:
Item-specific license agreed upon to submission
Description: