Preprint Article Version 1 This version is not peer-reviewed

Exploit Delivery using Steganography as Covert Channel

Version 1 : Received: 1 January 2019 / Approved: 3 January 2019 / Online: 3 January 2019 (14:35:03 CET)

How to cite: Khairallah, T. Exploit Delivery using Steganography as Covert Channel. Preprints 2019, 2019010030 (doi: 10.20944/preprints201901.0030.v1). Khairallah, T. Exploit Delivery using Steganography as Covert Channel. Preprints 2019, 2019010030 (doi: 10.20944/preprints201901.0030.v1).

Abstract

Security is a major topic in recent researchers, and finding new methods deliver was the motivations for this research to emphasize and as an awareness to browsers developers to handle images with more care and to enhance exploit detection technology in the browser, as this paper proves that hackers now can attack users with just an image.

Subject Areas

Steganography, exploitation, Malicious Code

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our diversity statement.

Leave a public comment
Send a private comment to the author(s)
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.