Engineering and Scientific International Journal
Yazarlar: Ramesh Cheripelli, Swathi Ch
Konular:-
DOI:10.30726/esij/v8.i3.2021.83017
Anahtar Kelimeler:Behavioural Detection,Malware Evasion,Shadow Attack,System Call Obfuscation,Electronic Mail,Authentication,Password,Cross Site Password Reuses
Özet: Carefully marked Portable Document Formats (PDFs) are utilized in agreements, contracts, bills, proposals, and arrangements to ensure the genuineness and trustworthiness of their material. A normal client would accept that carefully marked PDF records are conclusive and cannot be additionally altered. Be that as it may, different changes like adding comments to a marked PDF or rounding out structure fields are permitted and do not nullify PDF marks. In this paper, we show that this adaptability permits attackers to totally change a record’s substance while keeping the first signature approval status immaculate.