@inproceedings{da014d7c954f451481ae2e0febdc6456,
title = "Covert channel cyber-attack over video stream DCT payload: (Copyright protection algorithm for video and audio streams)",
abstract = "The two main cyber-attack techniques via video packets are based on using the packet header or the payload. Most of the standard software protection tools easily detect anomalies in headers since there are fewer places to embed the malicious content. Moreover, due to the relatively small header size, such attacks are limited by the data volumes that can transfer. On the other hand, a cyber-attack that uses video packets{\textquoteright} payload can effectively conceal much more information and produce covert channels. Multimedia covert channels provide reasonable bandwidth and long-lasting transmission streams, suitable for planting malicious information and therefore used as an exploit alternative. The primary focus of this article is a proof of concept of cyber-attack that conceals malicious data in a video payload in the compressed domain, using steganography (in real time). This malicious data is extracted using a covert channel and a malware (that had previously planted at the end user side), on the other side. Additionally, after the implementation of the attack, it is necessary to review its parameters and conclude what the optimal parameters to use in different video scenarios. In this paper, we will demonstrate attacks that take advantage of compressed domain video payload. It is important to note that this method can be used as a method of copyright protection.",
keywords = "Cyber, DCT, Discrete Cosine Transform, Exploit, Inter prediction, Intra prediction, Invisible covert channel, Motion vectors, Steganography, Steno objects, Watermarking",
author = "Yoram Segal and Ofer Hadar",
note = "Publisher Copyright: {\textcopyright} Springer Nature Switzerland AG 2019.; 3rd International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019 ; Conference date: 27-06-2019 Through 28-06-2019",
year = "2019",
month = jan,
day = "1",
doi = "https://doi.org/10.1007/978-3-030-20951-3_4",
language = "American English",
isbn = "9783030209506",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "47--66",
editor = "Shlomi Dolev and Danny Hendler and Sachin Lodha and Moti Yung",
booktitle = "Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings",
address = "Germany",
}