扫描工具,用于检测嵌入恶意程序的图像

Robert T. R. Shoniwa, Geogen George
{"title":"扫描工具,用于检测嵌入恶意程序的图像","authors":"Robert T. R. Shoniwa, Geogen George","doi":"10.1109/EESCO.2015.7253960","DOIUrl":null,"url":null,"abstract":"Nowadays, malware is being deployed onto victim systems in an increasingly diverse number of ways. One of these methods involves the passive propagation of malware by embedding in JPEG images which goes on to highlight that even simple images can be manipulated maliciously by criminals. The aim of this paper is comprised of two main aspects. The first involves the development of an embedding module which exploits this vulnerability as a proof-of-concept. Its primary purpose will be the pipelining of a Remote Access Trojan into an image file through steganography and obfuscation of the payload. The second aspect will involve developing a corresponding steganalysis tool to scan, detect and notify the user of the presence of a malicious program in either one or a set of selected images. It will also give a brief summarized analysis of the detected payload. Ultimately, this will act as a proof-of-concept highlighting the need to consider images as a potential attack vector and then also offer a corresponding solution to this problem.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Scanning tool for the detection of images embedded with malicious programs\",\"authors\":\"Robert T. R. Shoniwa, Geogen George\",\"doi\":\"10.1109/EESCO.2015.7253960\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, malware is being deployed onto victim systems in an increasingly diverse number of ways. One of these methods involves the passive propagation of malware by embedding in JPEG images which goes on to highlight that even simple images can be manipulated maliciously by criminals. The aim of this paper is comprised of two main aspects. The first involves the development of an embedding module which exploits this vulnerability as a proof-of-concept. Its primary purpose will be the pipelining of a Remote Access Trojan into an image file through steganography and obfuscation of the payload. The second aspect will involve developing a corresponding steganalysis tool to scan, detect and notify the user of the presence of a malicious program in either one or a set of selected images. It will also give a brief summarized analysis of the detected payload. Ultimately, this will act as a proof-of-concept highlighting the need to consider images as a potential attack vector and then also offer a corresponding solution to this problem.\",\"PeriodicalId\":305584,\"journal\":{\"name\":\"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EESCO.2015.7253960\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EESCO.2015.7253960","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

如今,恶意软件正以越来越多样化的方式部署到受害者系统上。其中一种方法涉及通过在JPEG图像中嵌入恶意软件的被动传播,这进一步强调了即使是简单的图像也可以被犯罪分子恶意操纵。本文的目的主要包括两个方面。第一种方法是开发一个嵌入模块,利用这个漏洞进行概念验证。它的主要目的是将远程访问木马通过隐写和有效载荷的混淆将其管道化到图像文件中。第二个方面将涉及开发相应的隐写分析工具来扫描,检测并通知用户在一个或一组选定图像中存在恶意程序。它还将对探测到的有效载荷进行简要总结分析。最终,这将作为一个概念验证,强调需要将图像视为潜在的攻击向量,然后还提供相应的解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Scanning tool for the detection of images embedded with malicious programs
Nowadays, malware is being deployed onto victim systems in an increasingly diverse number of ways. One of these methods involves the passive propagation of malware by embedding in JPEG images which goes on to highlight that even simple images can be manipulated maliciously by criminals. The aim of this paper is comprised of two main aspects. The first involves the development of an embedding module which exploits this vulnerability as a proof-of-concept. Its primary purpose will be the pipelining of a Remote Access Trojan into an image file through steganography and obfuscation of the payload. The second aspect will involve developing a corresponding steganalysis tool to scan, detect and notify the user of the presence of a malicious program in either one or a set of selected images. It will also give a brief summarized analysis of the detected payload. Ultimately, this will act as a proof-of-concept highlighting the need to consider images as a potential attack vector and then also offer a corresponding solution to this problem.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信