Vulnerability exploitations using steganography in PDF files

6Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.

Abstract

This article analyses the ways malicious executable files hides with Steganography on the most used files of our daily basis such as PDF, Word, Text, and Image. It demonstrates how data is hidden and gathers innovative ways of identifying potential attacks to prevent them by engaging the safety and exploitation of files distributed online. It is concerned with infected files that can have malicious executable applications embedded, executing itself upon the opening of the original file. Several experiments are detailed exploiting gaps in PDF, email and image files in order to draw awareness to security professionals and Ethical hackers' trainees.

Cite

CITATION STYLE

APA

Araujo, I. I., & Kazemian, H. (2020). Vulnerability exploitations using steganography in PDF files. International Journal of Computer Networks and Applications, 7(1), 10–18. https://doi.org/10.22247/ijcna/2020/193270

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free