STEGOSPLOIT IN SYSTEMS FOR TRANSFERING AND DISPLAYING IMAGES

Authors

  • Aleksandra Mišić Autor

DOI:

https://doi.org/10.24867/06BE47Misic

Keywords:

stegosploit, images, security, steganography, polyglot, JPEG, PNG

Abstract

This paper presents the class of attacks called stegosploit. We describe how the malicious files are created and delivered, as well as possible security controls for mitigating this class of cyber threats.

References

[1] Stegosploit, https://www.youtube.com/watch?v=np0mPy-EHII (datum poslednjeg pristupa 14.09. 2019)
[2] Dr. M. Umamaheswari, Prof. S. Sivasubramanian , S. Pandiarajan “Applied Optimal Control”, 2010.
[3] https://stegosploit.info/ (datum poslednjeg pristupa 14.09. 2019)
[4] Data compression, https://en.wikipedia.org/wiki/Data_compression (datum poslednjeg pristupa 14.09. 2019)
[5] JPEG format podataka, https://en.wikipedia.org/wiki/JPEG_File_Interchange_Format (datum poslednjeg pristupa 14.09. 2019)
[6] PNG format podataka, https://www.w3.org/TR/2003/REC-PNG-20031110/ (datum poslednjeg pristupa 14.09. 2019)

Published

2019-12-30

Issue

Section

Electrotechnical and Computer Engineering