Cyber Threat Intelligence by Ali Dehghantanha Mauro Conti & Tooska Dargahi
Author:Ali Dehghantanha, Mauro Conti & Tooska Dargahi
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
Content Streams
These are PDF stream objects whose data consists of a sequence of instructions describing the appearance of any graphical entity to be rendered on a page. These objects are distinct from the basic types of data objects. The instructions can also refer to other indirect objects which contain information about resources used by the stream.
2.2 PDF Document Obfuscation Techniques
Obfuscation is a well-known approach leveraged by malware coders to hide malicious code from inspection efforts. Code obfuscation is, in general, a legitimate technique that is widely used to protect proprietary code, however it is also one of the best evasion techniques used by malicious coders to fool malware detection systems (especially those based on signature matching) or to make the work of an expert analyst more complex and time consuming. Kittilsen listed several techniques [5] that are usually employed to hide JavaScript code in PDF files. Separating Malicious Code over Multiple Objects: the code embedded in the PDF document is fragmented among several objects and reassembled upon execution. This technique is made possible by exploiting the reference feature that is relevant to the indirect objects.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Digital Forensics and Incident Response - Second Edition by Gerard Johansen(1468)
Network Security Strategies by Aditya Mukherjee(1370)
Modern Cryptography for Cybersecurity Professionals by Lisa Bock(1339)
Practical Cybersecurity Architecture by Diana Kelley Ed Moyle(1330)
Web Penetration Testing with Kali Linux - Third Edition by Gilberto Nájera-Gutiérrez(785)
Web Application Obfuscation by Mario Heiderich & Eduardo Alberto Vela Nava & Gareth Heyes & David Lindsay(586)
Cybersecurity - Attack and Defense Strategies by Erdal Ozkaya & Yuri Diogenes(581)
GCIH GIAC Certified Incident Handler All-in-One Exam Guide by Nick Mitropoulos(471)
Kali Linux Penetration Testing Bible by Gus Khawaja(428)
Cybercrime Investigations by John Bandler(412)
The Hardware Hacking Handbook by Colin O'Flynn(391)
Computer Hacking Forensic Investigator Exam Workbook: 500+ Questions & Answers for ECCouncil 312-49: Updated 2020 by Aries+ Centre(359)
Kali Linux: Testing Your Network: How to Test Infrastructure Security with Security Testing and Penetration Testing by Eltrinos Frank(352)
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks by Purackal Rachel Sebastian(324)
Security in Computing, 5e by Charles P. Pfleeger & Shari Lawrence Pfleeger & Jonathan Margulies(322)
Penetration Testing and Reverse Engineering: Intrusion Detection Systems and e-Commerce Websites by Rob Kowalski(316)
8 Steps to Better Security by Crawley Kim;(311)
Security, Privacy and User Interaction by Unknown(287)
Cybersecurity: A Self-Teaching Introduction by C.P. Gupta & K.K. Goyal(279)
