Scanning tool for the detection of images embedded with malicious programs

Robert T. R. Shoniwa, Geogen George
{"title":"Scanning tool for the detection of images embedded with malicious programs","authors":"Robert T. R. Shoniwa, Geogen George","doi":"10.1109/EESCO.2015.7253960","DOIUrl":null,"url":null,"abstract":"Nowadays, malware is being deployed onto victim systems in an increasingly diverse number of ways. One of these methods involves the passive propagation of malware by embedding in JPEG images which goes on to highlight that even simple images can be manipulated maliciously by criminals. The aim of this paper is comprised of two main aspects. The first involves the development of an embedding module which exploits this vulnerability as a proof-of-concept. Its primary purpose will be the pipelining of a Remote Access Trojan into an image file through steganography and obfuscation of the payload. The second aspect will involve developing a corresponding steganalysis tool to scan, detect and notify the user of the presence of a malicious program in either one or a set of selected images. It will also give a brief summarized analysis of the detected payload. Ultimately, this will act as a proof-of-concept highlighting the need to consider images as a potential attack vector and then also offer a corresponding solution to this problem.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EESCO.2015.7253960","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Nowadays, malware is being deployed onto victim systems in an increasingly diverse number of ways. One of these methods involves the passive propagation of malware by embedding in JPEG images which goes on to highlight that even simple images can be manipulated maliciously by criminals. The aim of this paper is comprised of two main aspects. The first involves the development of an embedding module which exploits this vulnerability as a proof-of-concept. Its primary purpose will be the pipelining of a Remote Access Trojan into an image file through steganography and obfuscation of the payload. The second aspect will involve developing a corresponding steganalysis tool to scan, detect and notify the user of the presence of a malicious program in either one or a set of selected images. It will also give a brief summarized analysis of the detected payload. Ultimately, this will act as a proof-of-concept highlighting the need to consider images as a potential attack vector and then also offer a corresponding solution to this problem.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
扫描工具,用于检测嵌入恶意程序的图像
如今,恶意软件正以越来越多样化的方式部署到受害者系统上。其中一种方法涉及通过在JPEG图像中嵌入恶意软件的被动传播,这进一步强调了即使是简单的图像也可以被犯罪分子恶意操纵。本文的目的主要包括两个方面。第一种方法是开发一个嵌入模块,利用这个漏洞进行概念验证。它的主要目的是将远程访问木马通过隐写和有效载荷的混淆将其管道化到图像文件中。第二个方面将涉及开发相应的隐写分析工具来扫描,检测并通知用户在一个或一组选定图像中存在恶意程序。它还将对探测到的有效载荷进行简要总结分析。最终,这将作为一个概念验证,强调需要将图像视为潜在的攻击向量,然后还提供相应的解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
IEEE copyright and consent form IEEE copyright and consent form Neuro-Genetic and CCM based biometrical authentication through side-view of human-face A feasibility analysis of decentralized solar power using RETScreen in Odisha Scanning tool for the detection of images embedded with malicious programs
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1