International audienceOrganizations publish and share more and more electronic documents like PDF files. Unfortunately, most organizations are unaware that these documents can compromise sensitive information like authors names, details on the information system and architecture. All these information can be exploited easily by attackers to footprint and later attack an organization. In this paper, we analyze hidden data found in the PDF files published by an organization. We gathered a corpus of 39664 PDF files published by 75 security agencies from 47 countries. We have been able to measure the quality and quantity of information exposed in these PDF files. It can be effectively used to find weak links in an organization: the employees wh...
We present a steganalytic attack against the PDF component of the popular OpenPuff tool. We show tha...
Over the last decade, malicious software (or malware, for short) has shown an increasing sophisticat...
With multiple possible carriers of malware, one of the most targeted file formats by malware writers...
International audienceOrganizations publish and share more and more electronic documents like PDF fi...
This article analyses the ways malicious executable files hides with Steganography on the most used ...
International audienceAuthors are often not aware of hidden information and that they can contain mo...
Cyber-attacks are growing day by day and attackers are finding new techniques to cause harm to their...
The Portable Document Format (PDF) is a widely used, cross -platform file format for document exchan...
ENGLISH: The PDF-file format is a very popular format to perform attacks with due to the format bein...
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard f...
Microsoft’s Compound File Binary Format can contain information that is hidden but recoverable, as a...
The number of PDF files with embedded malicious code has risen significantly in the past few years. ...
Today, the average computer user has undoubtedly encountered the PDF format while handling electroni...
For a long time PDF documents have arrived in the everyday life of the average computer user, corpor...
From 2007 onward, the PDF document has proven to be a successful vector for malware infections, maki...
We present a steganalytic attack against the PDF component of the popular OpenPuff tool. We show tha...
Over the last decade, malicious software (or malware, for short) has shown an increasing sophisticat...
With multiple possible carriers of malware, one of the most targeted file formats by malware writers...
International audienceOrganizations publish and share more and more electronic documents like PDF fi...
This article analyses the ways malicious executable files hides with Steganography on the most used ...
International audienceAuthors are often not aware of hidden information and that they can contain mo...
Cyber-attacks are growing day by day and attackers are finding new techniques to cause harm to their...
The Portable Document Format (PDF) is a widely used, cross -platform file format for document exchan...
ENGLISH: The PDF-file format is a very popular format to perform attacks with due to the format bein...
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard f...
Microsoft’s Compound File Binary Format can contain information that is hidden but recoverable, as a...
The number of PDF files with embedded malicious code has risen significantly in the past few years. ...
Today, the average computer user has undoubtedly encountered the PDF format while handling electroni...
For a long time PDF documents have arrived in the everyday life of the average computer user, corpor...
From 2007 onward, the PDF document has proven to be a successful vector for malware infections, maki...
We present a steganalytic attack against the PDF component of the popular OpenPuff tool. We show tha...
Over the last decade, malicious software (or malware, for short) has shown an increasing sophisticat...
With multiple possible carriers of malware, one of the most targeted file formats by malware writers...