Novel Office-Based Covert Channels
What if a hacker attempting to steal your data could do so without the use of complex malware? What if your work computer already contains everything it needs? In this exhibit, we explore the possibilities of combining living-off-the-land technology with the use of covert channels, and display two examples of this concept at work for data exfiltration and hidden communications.
Topics
Exhibitor
Jess Beckwith
Advisor(s)
Prof. Daryl Johnson
Organization
Computing Security Master's Capstone Project
Thank you to all of our sponsors!