Video files and multistage attacks: (Im)possible? | IEEE Conference Publication | IEEE Xplore