Vulnerability exploitations using steganography in PDF files

Araujo, Istteffanny Isloure and Kazemian, Hassan (2020) Vulnerability exploitations using steganography in PDF files. International Journal of Computer Networks and Applications (IJCNA), 7 (1). pp. 10-18. ISSN 2395-0455

Abstract

This article analyses the ways malicious executable files hides with Steganography on the most used files of our daily basis such as PDF, Word, Text, and Image. It demonstrates how data is hidden and gathers innovative ways of identifying potential attacks to prevent them by engaging the safety and exploitation of files distributed online. It is concerned with infected files that can have malicious executable applications embedded, executing itself upon the opening of the original file. Several experiments are detailed exploiting gaps in PDF, email and image files in order to draw awareness to security professionals and Ethical hackers’ trainees.

Documents
5717:30675
[img]
Preview
IJCNA-2020-O-02.pdf - Published Version

Download (892kB) | Preview
Details
Record
Statistics

Downloads

Downloads per month over past year



Downloads each year

View Item View Item