Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification.
Jana DittmannChristian KraetzerJost AlemannBernhard BirnbaumPublished in: IH&MMSec (2024)
Keyphrases
- learning algorithm
- dynamic programming
- computational complexity
- search space
- experimental study
- k means
- matching algorithm
- digital images
- statistical analysis
- detection algorithm
- optimal solution
- cost function
- static analysis
- document analysis
- complexity analysis
- expectation maximization
- heuristic rules
- law enforcement
- recognition algorithm
- neural network
- np hard
- data mining