Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Exploit Delivery using Steganography as Covert Channel

Version 1 : Received: 1 January 2019 / Approved: 3 January 2019 / Online: 3 January 2019 (14:35:03 CET)

How to cite: Khairallah, T. Exploit Delivery using Steganography as Covert Channel. Preprints 2019, 2019010030. https://doi.org/10.20944/preprints201901.0030.v1 Khairallah, T. Exploit Delivery using Steganography as Covert Channel. Preprints 2019, 2019010030. https://doi.org/10.20944/preprints201901.0030.v1

Abstract

Security is a major topic in recent researchers, and finding new methods deliver was the motivations for this research to emphasize and as an awareness to browsers developers to handle images with more care and to enhance exploit detection technology in the browser, as this paper proves that hackers now can attack users with just an image.

Keywords

Steganography, exploitation, Malicious Code

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.