The Extendable Guideline for Analysing Malicious PDF Documents

作者: Peter Sjöholm

DOI:

关键词:

摘要: Today, the average computer user has undoubtedly encountered PDF format while handling electronic documents. Due to its wide-spread popularity and feature richness, documents are commonly u ...

参考文章(10)
Blake Hartstein, Matthew Richard, Steven Adair, Michael Ligh, Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code ,(2010)
Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Michael Lester, None, Gray Hat Hacking : The Ethical Hacker's Handbook ,(2004)
Caglar Ulucenk, Vijay Varadharajan, Venkat Balakrishnan, Udaya Tupakula, Techniques for Analysing PDF Malware asia-pacific software engineering conference. pp. 41- 48 ,(2011) , 10.1109/APSEC.2011.41
Florian Schmitt, Jan Gassen, Elmar Gerhards-Padilla, PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents conference on privacy, security and trust. pp. 104- 111 ,(2012) , 10.1109/PST.2012.6297926
Xun Lu, Tsinghua Cyberspace, Jianwei Zhuge, Ruoyu Wang, Yinzhi Cao, Yan Chen, De-obfuscation and Detection of Malicious PDF Files with High Accuracy hawaii international conference on system sciences. pp. 4890- 4899 ,(2013) , 10.1109/HICSS.2013.166
John Lewis, William Loftus, Allan Smith, Java Software Solutions: Foundations of Program Design ,(1997)
Dieter Gollmann, Computer Security ,(1999)
Jarle Kittilsen, Detecting malicious PDF documents 112. ,(2011)