Vulnerability exploitations using steganography in PDF files
暂无分享,去创建一个
[1] Didier Stevens. Malicious PDF Documents Explained , 2011, IEEE Security & Privacy.
[2] Xueqi Cheng,et al. Data Hiding in a Kind of PDF Texts for Secret Communication , 2007, Int. J. Netw. Secur..
[3] Salvatore J. Stolfo,et al. Research in Attacks, Intrusions, and Defenses , 2013, Lecture Notes in Computer Science.
[4] Pierre Richer. Steganalysis: Detecting hidden information with computer forensic analysis , 2019 .
[5] Taeho Kwon,et al. Detecting and Analyzing Insecure Component Integration , 2011 .
[6] Pavel Laskov,et al. Detection of Malicious PDF Files Based on Hierarchical Document Structure , 2013, NDSS.
[7] Gregg H. Gunsch,et al. Blind Stenanography Detection Using a Computational Immune System: A Work in Progress , 2003, Int. J. Digit. EVid..
[8] Nesir Rasool Mahmood,et al. Public Key Steganography , 2014 .
[9] B. B. Zaidan,et al. Overview: Main Fundamentals for Steganography , 2010, ArXiv.
[10] J C Judge,et al. Steganography: Past, Present, Future , 2001 .