By Topic

Analyzing characteristics of malicious PDFs

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Robledo, H.G. ; Univ. Politec. de San Luis Potosi, San Luis Potosi, Mexico

This paper presents an analysis of some characteristics from malicious PDFs files. This characteristics where examined on a testbed of 11,104 malicious and 8,668 non malicious files, the malicious samples includes some 0days and files used on the wild for focused attacks. The PDF format is showed very quickly only to help understand the attack vectors. The malicious PDF files attacks are on the wild for almost three years, and recently this kind of attacks are incrementing, and the techniques used to hide from anti-virus software are growing in complex, so this is why is important now to work on understand how this malicious PDF files are formed.

Published in:

Latin America Transactions, IEEE (Revista IEEE America Latina)  (Volume:10 ,  Issue: 3 )