PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents

@article{Schmitt2012PDFSD,
  title={PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents},
  author={Florian Schmitt and Jan Gassen and Elmar Gerhards-Padilla},
  journal={2012 Tenth Annual International Conference on Privacy, Security and Trust},
  year={2012},
  pages={104-111}
}
For a long time PDF documents have arrived in the everyday life of the average computer user, corporate businesses and critical structures, as authorities and military. Due to its wide spread in general, and because out-of-date versions of PDF readers are quite common, using PDF documents has become a popular malware distribution strategy. In this context, malicious documents have useful features: they are trustworthy, attacks can be camouflaged by inconspicuous document content, but still… CONTINUE READING
Highly Cited
This paper has 37 citations. REVIEW CITATIONS

References

Publications referenced by this paper.
Showing 1-10 of 20 references

Apache PDFBox - Java PDF Library

  • T.A.S. Foundation
  • http:// pdfbox.apache.org/.
Highly Influential
5 Excerpts

The Rise of PDF Malware

  • K. Selvaraj, N. F. Gutierrez
  • 2010. [Online]. Available: http://www.symantec…
  • 2010
Highly Influential
3 Excerpts

How PDF files hide malware Example PDF scan from Xerox

  • E. Balunsat
  • 2011. [Online]. Available: http://blog.commtouch…
  • 2011
1 Excerpt

How to Extract Flash Objects from Malicious PDF Files

  • L. Zeltser
  • 2011. [Online]. Available: http://computer…
  • 2011
1 Excerpt

Military Targets

  • M. Hypponen
  • 2011. [Online]. Available: http: //www.f-secure…
  • 2011
1 Excerpt

Six out of every ten users run vulnerable versions of Adobe Reader

  • Avast Software
  • 2011. [Online]. Available: http://public.avast…
  • 2011
1 Excerpt

State of the Web - Quarter 2, 2011 Report

  • M. Sutton, J. Sobrier, M. Geide, P. Kulkarni, U. Wanve
  • 2011. [Online]. Available: http: //www.zscaler…
  • 2011
1 Excerpt

Targeted attacks on arms manufacturers continue

  • The H security
  • 2011. [Online]. Available: http://www.h-online…
  • 2011
1 Excerpt

Similar Papers

Loading similar papers…