The Portable Document Format (PDF) is a widely used, cross -platform file format for document exchange. Several applications exist for parsing and rendering PDF documents, with Adobe's Acrobat Reader being the most widely used PDF reader. Starting in 2007, several vulnerabilities in Adobe Reader were discovered being exploited in the wild. PDF- based exploits continued to proliferate during 2008 and 2009, and, although recent security reports have noted a decline in the numbers of PDF-based malware in 2011, malicious PDFs are likely to continue to be a significant threat for the next few years, given the ubiquity of the PDF format and the existence of a large base of unpatched Adobe Reader installations. In this work, we try to understand t...
International audienceOrganizations publish and share more and more electronic documents like PDF fi...
ENGLISH: The PDF-file format is a very popular format to perform attacks with due to the format bein...
This article analyses the ways malicious executable files hides with Steganography on the most used ...
Cyber-attacks are growing day by day and attackers are finding new techniques to cause harm to their...
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard f...
The number of PDF files with embedded malicious code has risen significantly in the past few years. ...
Over the last decade, malicious software (or malware, for short) has shown an increasing sophisticat...
Malicious PDF document files and malicious executables packaged as anti-virus have become a popular ...
Today, the average computer user has undoubtedly encountered the PDF format while handling electroni...
Phishing PDFs are malicious PDF documents that do not embed malware but trick victims into visiting ...
Today, PDF is one of the widely used applications for sharing documents. Some of the important facto...
With the development of network and information technology, E-mail has became increasingly popular a...
Malware still constitutes a major threat in the cybersecurity landscape, also due to the widespread ...
peer reviewedIn this paper we introduce an efficient application for malicious PDF detection: ADEPT....
For a long time PDF documents have arrived in the everyday life of the average computer user, corpor...
International audienceOrganizations publish and share more and more electronic documents like PDF fi...
ENGLISH: The PDF-file format is a very popular format to perform attacks with due to the format bein...
This article analyses the ways malicious executable files hides with Steganography on the most used ...
Cyber-attacks are growing day by day and attackers are finding new techniques to cause harm to their...
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard f...
The number of PDF files with embedded malicious code has risen significantly in the past few years. ...
Over the last decade, malicious software (or malware, for short) has shown an increasing sophisticat...
Malicious PDF document files and malicious executables packaged as anti-virus have become a popular ...
Today, the average computer user has undoubtedly encountered the PDF format while handling electroni...
Phishing PDFs are malicious PDF documents that do not embed malware but trick victims into visiting ...
Today, PDF is one of the widely used applications for sharing documents. Some of the important facto...
With the development of network and information technology, E-mail has became increasingly popular a...
Malware still constitutes a major threat in the cybersecurity landscape, also due to the widespread ...
peer reviewedIn this paper we introduce an efficient application for malicious PDF detection: ADEPT....
For a long time PDF documents have arrived in the everyday life of the average computer user, corpor...
International audienceOrganizations publish and share more and more electronic documents like PDF fi...
ENGLISH: The PDF-file format is a very popular format to perform attacks with due to the format bein...
This article analyses the ways malicious executable files hides with Steganography on the most used ...