STEGOSPLOIT IN SYSTEMS FOR TRANSFERING AND DISPLAYING IMAGES
DOI:
https://doi.org/10.24867/06BE47MisicKeywords:
stegosploit, images, security, steganography, polyglot, JPEG, PNGAbstract
This paper presents the class of attacks called stegosploit. We describe how the malicious files are created and delivered, as well as possible security controls for mitigating this class of cyber threats.
References
[1] Stegosploit, https://www.youtube.com/watch?v=np0mPy-EHII (datum poslednjeg pristupa 14.09. 2019)
[2] Dr. M. Umamaheswari, Prof. S. Sivasubramanian , S. Pandiarajan “Applied Optimal Control”, 2010.
[3] https://stegosploit.info/ (datum poslednjeg pristupa 14.09. 2019)
[4] Data compression, https://en.wikipedia.org/wiki/Data_compression (datum poslednjeg pristupa 14.09. 2019)
[5] JPEG format podataka, https://en.wikipedia.org/wiki/JPEG_File_Interchange_Format (datum poslednjeg pristupa 14.09. 2019)
[6] PNG format podataka, https://www.w3.org/TR/2003/REC-PNG-20031110/ (datum poslednjeg pristupa 14.09. 2019)
[2] Dr. M. Umamaheswari, Prof. S. Sivasubramanian , S. Pandiarajan “Applied Optimal Control”, 2010.
[3] https://stegosploit.info/ (datum poslednjeg pristupa 14.09. 2019)
[4] Data compression, https://en.wikipedia.org/wiki/Data_compression (datum poslednjeg pristupa 14.09. 2019)
[5] JPEG format podataka, https://en.wikipedia.org/wiki/JPEG_File_Interchange_Format (datum poslednjeg pristupa 14.09. 2019)
[6] PNG format podataka, https://www.w3.org/TR/2003/REC-PNG-20031110/ (datum poslednjeg pristupa 14.09. 2019)
Downloads
Published
2019-12-30
Issue
Section
Electrotechnical and Computer Engineering