Author:
Jung Dong-Seob,Lee Sang-Joon,Euom Ieck-Chae
Abstract
Malicious codes may cause virus infections or threats of ransomware through symmetric encryption. Moreover, various bypassing techniques such as steganography, which refers to the hiding of malicious code in image files, have been devised. Unknown or new malware hidden in an image file in the form of malicious code is difficult to detect using most representative reputation- or signature-based antivirus methods. In this paper, we propose the use of ImageDetox method to neutralize malicious code hidden in an image file even in the absence of any prior information regarding the signatures or characteristics of the code. This method is composed of four modules: image file extraction, image file format analysis, image file conversion, and the convergence of image file management modules. To demonstrate the effectiveness of the proposed method, 30 image files with hidden malicious codes were used in an experiment. The malicious codes were selected from 48,220 recent malicious codes purchased from VirusTotal (a commercial application programming interface (API)). The experimental results showed that the detection rate of viruses was remarkably reduced. In addition, image files from which the hidden malicious code had previously been removed using a nonlinear transfer function maintained nearly the same quality as that of the original image; in particular, the difference could not be distinguished by the naked eye. The proposed method can also be utilized to prevent security threats resulting from the concealment of confidential information in image files with the aim of leaking such threats.
Subject
Physics and Astronomy (miscellaneous),General Mathematics,Chemistry (miscellaneous),Computer Science (miscellaneous)
Reference32 articles.
1. AVTEST Malware Statistics
http://www.av-test.org/en/statistics/malware/html
2. Hunesion i-oneNet
http://www.hunesion.com/?page_id=3192
3. ITSCC Common Criteria Certification. Korean National Protection Profile
http://www.itscc.kr
4. A Study of Unidirectional Data Transmission System Security Model for Secure Data transmission in Separated Network
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Comparative Analysis on Exploration of Stegosploits across Various Media Formats;2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS);2024-04-18
2. Detection of Location of Audio-Stegware in LSB Audio Steganography;Proceedings of International Conference on Computational Intelligence and Data Engineering;2023
3. Revealing MageCart-like Threats in Favicons via Artificial Intelligence;Proceedings of the 17th International Conference on Availability, Reliability and Security;2022-08-23
4. Framework for Malware Triggering Using Steganography;Applied Sciences;2022-08-16
5. Prevention of hidden information security attacks by neutralizing Stego-Malware;Computers and Electrical Engineering;2022-07