2019
DOI: 10.1109/msec.2018.2875879
|View full text |Cite
|
Sign up to set email alerts
|

Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware

Abstract: Over the last decade, malicious software (or malware, for short) has shown an increasing sophistication and proliferation, fueled by a flourishing underground economy, in response to the increasing complexity of modern defense mechanisms. PDF documents are among the major vectors used to convey malware, thanks to the flexibility of their structure and the ability of embedding different kinds of content, ranging from images to JavaScript code. Despite the numerous efforts made by the research and industrial com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 38 publications
(41 citation statements)
references
References 12 publications
0
41
0
Order By: Relevance
“…They can operate by analyzing and classifying information retrieved either from the structure or the content of the document. More specifically, all systems aimed to detect malicious PDF files share the same basic structure (reported in Figure 2), which is composed of three main components [63]:…”
Section: Machine Learning For Pdf Malware Detectionmentioning
confidence: 99%
See 4 more Smart Citations
“…They can operate by analyzing and classifying information retrieved either from the structure or the content of the document. More specifically, all systems aimed to detect malicious PDF files share the same basic structure (reported in Figure 2), which is composed of three main components [63]:…”
Section: Machine Learning For Pdf Malware Detectionmentioning
confidence: 99%
“…In this attack, the attacker injects a specifically-crafted, malicious payload into a file that is recognized as benign by the classifier, by only exploiting black-box access to the classifier. The idea is that the corresponding feature modifications should not be sufficient to change the classification of the source sample from benign to malicious [62][63][64]83]. Such a strategy is exactly the opposite of mimicry attacks: while the latter inject benign information into a malicious file, reverse mimicry tends to minimize the amount of malicious information injected (by changing the injected payload when the attack fails).…”
Section: Heuristic-based Evasion Attacksmentioning
confidence: 99%
See 3 more Smart Citations