Phoning Home

  • John Aycock
Part of the Advances in Information Security book series (ADIS, volume 50)


There is clearly no point in spyware gathering information for an adversary without the adversary having the ability to collect it. Colloquially speaking, spyware must somehow “phone home,” transmitting or otherwise exfiltrating information. This chapter examines four aspects of this: the difference between push- and pull-based approaches to exfiltration; how spyware finds out where “home” is; hiding the fact that information is being leaked; general defenses against information leaking.


Covert Channel Hide Message Embed Message Internet Control Message Protocol Mother Ship 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of CalgaryCalgaryCanada

Personalised recommendations