Vulnerability exploitations using steganography in PDF files

Araujo, Istteffanny I. and Kazemian, Hassan (2020) Vulnerability exploitations using steganography in PDF files. International Journal of Computer Networks and Applications (IJCNA), 7 (1). pp. 10-18. ISSN 2395-0455

IJCNA-2020-O-02.pdf - Published Version

Download (892kB) | Preview

Abstract / Description

This article analyses the ways malicious executable files hides with Steganography on the most used files of our daily basis such as PDF, Word, Text, and Image. It demonstrates how data is hidden and gathers innovative ways of identifying potential attacks to prevent them by engaging the safety and exploitation of files distributed online. It is concerned with infected files that can have malicious executable applications embedded, executing itself upon the opening of the original file. Several experiments are detailed exploiting gaps in PDF, email and image files in order to draw awareness to security professionals and Ethical hackers’ trainees.

Item Type: Article
Uncontrolled Keywords: digital attacks; email security; ethical hacking; PDF security; steganography
Subjects: 000 Computer science, information & general works
Department: School of Computing and Digital Media
Depositing User: Hassan Kazemian
Date Deposited: 06 Apr 2020 10:36
Last Modified: 06 Apr 2020 10:36


Downloads per month over past year

Downloads each year

Actions (login required)

View Item View Item