CUING

8th International Workshop on Cyber Use of Information Hiding
  • Date
    Jul 31, 2024
  • Location
    SR08
  • Duration
    08:45 — 14:45
Workshops Lettering

Workshop Chairs

Workshop Chairs Logo Workshop Chairs Logo Workshop Chairs Logo Workshop Chairs Logo Workshop Chairs Logo Workshop Chairs Logo
  • → Wojciech Mazurczyk
  • → Philipp Amann
  • → Luca Caviglione
  • → Angelo Consoli
  • → Peter Kieseberg
  • → Joerg Keller

Accepted Paper

A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning
Jeff Schymiczek (University of Helsinki, Finland), Tobias Schmidbauer (Nuremberg Institute of Technology, Germany), Steffen Wendzel (Worms University of Applied Sciences, Germany)
Full Paper
How to evade modern web cryptojacking detection tools? A review of practical findings
Pawel Rajba (University of Wroclaw, Poland), Krzysztof Chmiel (University of Wroclaw, Poland)
Full Paper
Trustworthiness and explainability of a watermarking and machine learning-based system for image modification detection to combat disinformation
Andrea Rosales (Internet Interdisciplinary Institute (IN3), Universitat Oberta de Catalunya, Spain), Agnieszka Malanowska (Warsaw University of Technology, Poland), Tanya Koohpayeh Araghi (Internet Interdisciplinary Institute (IN3), Universitat Oberta de Catalunya, Barcelona, Spain, Spain), Minoru Kuribayashi (Center for Data-driven Science and Artificial Intelligence at Tohoku University Japan, Japan), Marcin Kowalczyk (Warsaw University of Technology, Poland), Daniel Blanche-Tarragó (Internet Interdisciplinary Institute (IN3), Universitat Oberta de Catalunya, Center, Spain), Wojciech Mazurczyk (Warsaw University of Technology, Poland), David Megías (Internet Interdisciplinary Institute (IN3), Universitat Oberta de Catalunya, Barcelona, Spain, Spain)
Full Paper
ZW-IDS: Zero-Watermarking-based network Intrusion Detection System using data provenance
Omair Faraj (Telecom SudParis, Institut Polytechnique de Paris, France), David Megias (Internet Interdisciplinary Institute, Universitat Oberta de Catalunya, Spain), Joaquin Garcia-Alfaro (Telecom SudParis, Institut Polytechnique de Paris, France)
Full Paper
Natural Language Steganography by ChatGPT
Martin Steinebach (Fraunhofer, Germany)
Full Paper
Single-image steganalysis in real-world scenarios based on classifier inconsistency detection
Daniel Lerch-Hostalot (Universitat Oberta de Catalunya, Spain), David Megías Jimenez (Universitat Oberta de Catalunya, Spain)
Full Paper
Are Deepfakes a Game-changer in Digital Images Steganography Leveraging the Cover-Source-Mismatch?
Arthur Méreur (Troyes University of Technology, France), Antoine Mallet (Troyes University of Technology, France), Rémi Cogranne (Troyes University of Technology, France)
Full Paper
A Comprehensive Pattern-based Overview of Stegomalware
Fabian Strachanski (University of Duisburg-Essen, Germany), Denis Petrov (Worms University of Applied Sciences, Germany), Tobias Schmidbauer (Nuremberg Institute of Technology, Germany), Steffen Wendzel (Worms University of Applied Sciences, Germany)
Full Paper
No Country for Leaking Containers: Detecting Exfiltration of Secrets Through AI and Syscalls
Marco Zuppelli (Institute for Applied Mathematics and Information Technologies, Italy), Massimo Guarascio (ICAR-CNR, Italy), Luca Caviglione (CNR - IMATI, Italy), Angelica Liguori (ICAR-CNR, Italy)
Full Paper
Robust and Homomorphic Covert Channels in Streams of Numeric Data
Jörg Keller (FernUniversität in Hagen, Germany), Carina Heßeling (FernuUniversitaet Hagen, Germany), Steffen Wendzel (Worms University of Applied Sciences, Germany)
Full Paper

Detail CUING 02/05

Topics of interest include, but are not limited to 03/05

  • Cyber information hiding techniques
  • Studies regarding the use of information hiding in cybercrime
  • Analysis of cybercrime cases related to information hiding
  • New steganographic & steganalysis methods
  • Local, air-gapped, and network covert channels
  • Side channels and less obvious usage of information hiding techniques
  • Digital watermarking of multimedia content and network traffic
  • Stegomalware-related research, including techniques and detection
  • Novel countermeasures against information hiding techniques: detection, prevention, limitation
  • Evasion, obfuscation, and anti-forensics techniques used in cyberattacks
  • Traffic type obfuscation techniques, e.g., traffic morphing
  • Hiding covert communication within network attacks, e.g., DDoS, SPAM, etc.
  • Underground marketplaces and their business models (e.g., legal and technical aspects of darknet)
  • Information-hiding-based botnets and their mitigation
  • Information hiding based on adversarial learning and generative AI
  • Utilization of AI/ML techniques for improved data hiding techniques and detection methods
  • Information hiding in AI/ML models and datasets
  • Utilization of information hiding techniques to fight disinformation
  • Privacy enhancing techniques
  • Aspects and methods for sharing strategic intelligence
  • Abusing legitimate social media, cloud-based services, etc. for information hiding purposes

Workshop Chairs 04/05

Workshop Chairs

Workshop Chairs Logo
Wojciech Mazurczyk
Warsaw University of Technology, Poland
Workshop Chairs Logo
Philipp Amann
Europol, European Cybercrime Centre, The Netherlands
Workshop Chairs Logo
Luca Caviglione
CNR – IMATI, Italy
Workshop Chairs Logo
Angelo Consoli
Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland
Workshop Chairs Logo
Peter Kieseberg
FH St. Pölten, Austria
Workshop Chairs Logo
Joerg Keller
FernUniversität in Hagen, Germany

Program Committee

Soumya Banerjee | CNAM-CEDRIC LAB, INRIA-EVA, Paris, France
Krzysztof Cabaj | Warsaw University of Technology, Poland
Michal Choras | Bydgoszcz University of Science and Technology, Poland
Jana Dittmann | Otto-von-Guericke University Magdeburg, Germany
Mordechai Guri | Ben-Gurion University of the Negev, Israel
Zbigniew Kotulski | Warsaw University of Technology, Poland
Rafal Kozik | Bydgoszcz University of Science and Technology, Poland
Christian Kraetzer | Otto-von-Guericke University Magdeburg, Germany
David Megias | Universitat Oberta de Catalunya, Spain
Aleksandra Mileva | University Goce Delcev, Republic of Macedonia
Marek Pawlicki | Bydgoszcz University of Science and Technology, Poland
Zbigniew Piotrowski | Military University of Technology, Poland
Steffen Wendzel | Worms University of Applied Sciences and FernUniversität in Hagen, Germany
Milad Taleby Ahvanooey | Nanjing University, China
Maria Carla Calzarossa | University of Pavia, Italy
Marco Cremonini, | University of Milan, Italy
Mattia Epifani | CNR, Italy
Massimo Guarascio | CNR – ICAR, Italy
Stefan Katzenbeisser | University of Passau, Germany
Minoru Kuribayashi | Okayama University, Japan
Jean-Francois Lalande | CentraleSupélec, France
Daniel Lerch-Hostalot | Universitat Oberta de Catalunya, Spain
Shujun Li | University of Kent, UK
Pawel Rajba | University of Wroclaw, Poland
Martin Steinebach | Fraunhofer SIT, Germany
Hui Tian | National Huaqiao University, China
Tanja Zseby | Vienna University of Technology, Austria
Marco Zuppelli | CNR – IMATI, Italy
Tobias Schmidbauer | Nuremberg Institute of Technology, Germany
Avinash Srinivasan | United States Naval Academy, USA
Remi Cogranne | Troyes University of Technology, France

Submission 05/05

Important Dates

Extended Submission Deadline May 14, 2024
Author Notification Jun 02, 2024
Proceedings Version Jun 18, 2024
Conference Jul 30 — Aug 02, 2024
Register here!
Join us at ARES 2024 in Vienna, Austria