Dissecting Malicious Word, PDF Documents

K Tanuja, CH Praneeth, D Haritha

Abstract


Internet and computers are now a part of our daily routine life. With the development of network and information technology, E-mail has became increasingly popular and the society’s indispensable need. However, virus spreading via the E-mail is also increasing at an enormous rate. The E-mail attachment such as PDF Document, Microsoft Word Document, EXE program can spread viruses from one computer to another computer. This paper describes and analyses the various forms of the E-mail viruses via the Microsoft Word Documents and the PDF Documents. We describe the methodology to detect such E-mail viruses using tools such as OfficeMalscanner for Word Documents and PDF stream Dumper for PDF Documents.


References


S.R.Subramanya, Natraj Lakshminarasimhan. “Computer Viruses”. IEEE Potentials,October/November 2001.

. Dai Haobing “Malicious PDF Document Analysis” 2013 .

Gabor Szappanos “VBA is not dead”. Virus Bulletin 2014

David Harley BA CISSP FBCS CITP, Andrew Lee .”Heuristic Analysis-Detecting Unknown virus”

Darren Chi. “Microsoft Office 2000 and Security against macro virus” Symantec AntiVirus Research Center Symantec Corporation

T. Hassan. User-guided wrapping of pdf documents using graph matching techniques. In International Conference on Document Analysis and Recognition 2009, Proceedings, 2009.

T. Hassan and R. Baumgartner. Table recognition and understanding from pdf files. In International Conference on Document Analysis and Recognition 2007, Proceedings, volume 2, pages 1143–1147, 2007

M. Cova, C. Kruegel, and G. Vigna. Detection and analysis of drive-by-download attacks and malicious javascript code. In Proceedings of the 19th International World Wide Web Conference (WWW),2010

T. Holz. Analyzing malicious pdf files, 2009. http:// honeyblog.org/archives/ 12-Analyzing-Malicious-PDF-Files.html.

D. Stevens. PDF tools. http://blog.didierstevens. com/programs/pdf-tools/.

D. Stevens. Malicious PDF documents explained. IEEE Security and Privacy, 9(1):80–82, 2011.

Adobe Systems Incorporated. PDF Reference.

Metasploit Framework: http://metasploit.com


Full Text: PDF[FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.