1 Trillion Dollar Refund: How To Spoof PDF Signatures

@article{Mladenov20191TD,
  title={1 Trillion Dollar Refund: How To Spoof PDF Signatures},
  author={Vladislav Mladenov and Christian Mainka and Karsten Meyer zu Selhausen and Martin Grothe and J{\"o}rg Schwenk},
  journal={Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security},
  year={2019}
}
The Portable Document Format (PDF) is the de-facto standard for document exchange worldwide. To guarantee the authenticity and integrity of documents, digital signatures are used. Several public and private services ranging from governments, public enterprises, banks, and payment services rely on the security of PDF signatures. In this paper, we present the first comprehensive security evaluation on digital signatures in PDFs. We introduce three novel attack classes which bypass the… Expand
Breaking the Specification: PDF Certification
TLDR
This paper presents the first comprehensive security evaluation on certification signatures in PDFs and describes two novel attack classes – Evil Annotation and Sneaky Signature attacks which abuse flaws in the current PDF specification. Expand
Shadow Attacks: Hiding and Replacing Content in Signed PDFs
TLDR
The tool PDF-Attacker is introduced which can automatically generate shadow attacks and PDF-Detector is implemented to prevent shadow documents from being signed or forensically detect exploits after being applied to signed PDFs. Expand
Practical Decryption exFiltration: Breaking PDF Encryption
TLDR
This paper analyzes PDF encryption and shows two novel techniques for breaking the confidentiality of encrypted documents, which allow the recovery of the entire plaintext ofencrypted documents by using exfiltration channels which are based on standard compliant PDF properties. Expand
Maintaining interoperability in open source software: A case study of the Apache PDFBox project
TLDR
Software interoperability is commonly achieved through the implementation of standards for communication protocols or data representation formats, which are often complex, difficult to understand and implement. Expand
Modeling the Dielectric Constant of Silicon-Based Nanocomposites Using Machine Learning
In this work, we solve the problem of predicting the dielectric constant of silicon-based nanocomposites using machine learning methods. Mathematical models and programs have been developed toExpand
On the Verification of Signed Messages

References

SHOWING 1-10 OF 78 REFERENCES
On Breaking SAML: Be Whoever You Want to Be
TLDR
An in-depth analysis of 14 major SAML frameworks is described and it is shown that 11 of them, including Salesforce, Shibboleth, and IBM XS40, have critical XML Signature wrapping (XSW) vulnerabilities. Expand
Hiding Malicious Content in PDF Documents
This paper is a proof-of-concept demonstration for a specific digital signatures vulnerability that shows the ineffectiveness of the WYSIWYS (What You See Is What You Sign) concept. The algorithm isExpand
Digital Document Signing: Vulnerabilities and Solutions
TLDR
The aim of this paper is to focus on the vulnerabilities of digital signature deriving from the “unobservability” of electronic documents and possible mechanisms to contrast such vulnerabilities are proposed. Expand
Malicious URI resolving in PDF documents
  • V. Hamon
  • Computer Science
  • Journal of Computer Virology and Hacking Techniques
  • 2013
TLDR
It’s shown that the simple use of an HTTP request from a PDF can be a pretty good vector for an attacker and how it can be relatively easy to reuse some vulnerabilities from outside the document. Expand
XML signature element wrapping attacks and countermeasures
TLDR
The general vulnerability and several related exploits are described and appropriate countermeasures are proposed, and the guidance necessary to prevent these attacks is provided. Expand
Digital signatures and electronic documents: a cautionary tale
TLDR
The space of such attacks is examined, and how many popular electronic document formats and PKI packages permit them are described, to help understand how to defend against such attacks. Expand
Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies
TLDR
This paper proposes a framework that automatically evaluates the enforcement of the policies imposed to third-party requests and argues that this proposed framework is a much-needed tool to detect bypasses and evaluate solutions to the exposed leaks. Expand
A structural and content-based approach for a precise and robust detection of malicious PDF files
TLDR
This paper presents a novel machine learning system for the automatic detection of malicious PDF documents that extracts information from both the structure and the content of the PDF file, and it features an advanced parsing mechanism. Expand
Malicious origami in PDF
TLDR
The PDF language and its security model is presented, and then the market leader of PDF software, Acrobat Reader is presented: how this format can be used for malicious purposes is shown. Expand
Static detection of malicious JavaScript-bearing PDF documents
TLDR
This contribution presents a technique for detection of JavaScript-bearing malicious PDF documents based on static analysis of extracted JavaScript code that has proved to be effective against both known and unknown malware and suitable for large-scale batch processing. Expand
...
1
2
3
4
5
...