Article
Version 1
Preserved in Portico This version is not peer-reviewed
Exploit Delivery using Steganography as Covert Channel
Version 1
: Received: 1 January 2019 / Approved: 3 January 2019 / Online: 3 January 2019 (14:35:03 CET)
How to cite: Khairallah, T. Exploit Delivery using Steganography as Covert Channel. Preprints 2019, 2019010030. https://doi.org/10.20944/preprints201901.0030.v1 Khairallah, T. Exploit Delivery using Steganography as Covert Channel. Preprints 2019, 2019010030. https://doi.org/10.20944/preprints201901.0030.v1
Abstract
Security is a major topic in recent researchers, and finding new methods deliver was the motivations for this research to emphasize and as an awareness to browsers developers to handle images with more care and to enhance exploit detection technology in the browser, as this paper proves that hackers now can attack users with just an image.
Keywords
Steganography, exploitation, Malicious Code
Subject
Computer Science and Mathematics, Computer Science
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment