Author:
Adhatarao Supriya,Lauradoux Cédric
Publisher
Springer International Publishing
Reference23 articles.
1. PDF Reference: Adobe Portable Document Format Version 1.4 with Cdrom. Addison-Wesley Longman Publishing Co., Inc, Boston, MA, USA, 3rd edn. (2001)
2. Adhatarao, S., Lauradoux, C.: Exploitation and Sanitization of Hidden Data in PDF Files. CoRR abs/2103.02707 (2021). https://arxiv.org/abs/2103.02707
3. Aura, T., Kuhn, T.A., Roe, M.: Scanning electronic documents for personally identifiable information. In: Juels, A., Winslett, M. (eds.) Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, pp. 41–50. ACM (2006)
4. Carmony, C., Hu, X., Yin, H., Bhaskar, A.V., Zhang, M.: Extract me if you can: abusing PDF parsers in malware detectors. In: 23rd Annual Network and Distributed System Security Symposium, NDSS 2016. The Internet Society (2016)
5. Castiglione, A., Santis, A.D., Soriente, C.: Security and privacy issues in the Portable Document Format. J. Syst. Softw. 83(10), 1813–1822 (2010)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An Enhanced Feature-Based Hybrid Approach for Adversarial PDF Malware Detection;2024 6th International Conference on Electrical Engineering and Information & Communication Technology (ICEEICT);2024-05-02
2. XAI-PDF: A Robust Framework for Malicious PDF Detection Leveraging SHAP-Based Feature Engineering;The International Arab Journal of Information Technology;2024-01-01
3. Forensic authenticity examination of PDF documents;Third International Conference on Computer Science and Communication Technology (ICCSCT 2022);2022-12-29
4. PDF Malware Detection Based on Optimizable Decision Trees;Electronics;2022-09-30