Dissecting Malicious Word, PDF Documents

Abstract

Internet and computers are now a part of our daily routine life. With the development of network and information technology, E-mail has became increasingly popular and the society’s indispensable need. However, virus spreading via the E-mail is also increasing at an enormous rate. The E-mail attachment such as PDF Document, Microsoft Word Document, EXE program can spread viruses from one computer to another computer. This paper describes and analyses the various forms of the E-mail viruses via the Microsoft Word Documents and the PDF Documents. We describe the methodology to detect such E-mail viruses using tools such as OfficeMalscanner for Word Documents and PDF stream Dumper for PDF Documents.

Authors and Affiliations

K. Tanuja| Dept of C.S.E, S.R.K. Institute Of Technology, Enikepadu, Krishna dist, AP, India, CH. Praneeth| Dept of C.S.E, S.R.K. Institute Of Technology, Enikepadu, Krishna dist, AP, India, Dr D. Haritha| Dept of C.S.E, S.R.K. Institute Of Technology, Enikepadu, Krishna dist, AP, India

Keywords

Related Articles

A Novel Method for Providing Discrete Filtering and Blacklisting Options for OSN Users

OSN has fabulous growth in recent years interacting millions of users. OSNs are provided with viewing friends content and sharing so much of information and messages among the users and users are allowed write someth...

In this work, a hierarchical access control method using a modified hierarchical attribute-based encryption (M-HABE) and a modified three-layer structure is proposed. Varying from the current ideal models, for exampl...

A Fast Bootstrapping Algorithm To Recreate The Initial Set Of Paths

We propose iPath, a novel way derivation way to deal with recreating the per-bundle directing ways in powerful and huge scale systems. The essential thought of iPath is to adventure high way closeness to iteratively...

Direct Torque Control for Matrix Converter Driven PMSM

This paper carries work on application of direct torque control for Five-Phase permanent magnet synchronous motor drives. In recent years, only voltage source inverters (VSIs) have been used to supply five-phase driv...

Design And Implementation of Cascaded Multilevel Inverter Topology With Reduced Number Of Components

In this paper, using H-bridge topology a general cascade multilevel inverter for the implementation of 49th level inverter and a new algorithm in generating all voltage levels for a 49th level with less number of dc...

Download PDF file
  • EP ID EP16473
  • DOI -
  • Views 318
  • Downloads 15

How To Cite

K. Tanuja, CH. Praneeth, Dr D. Haritha (2015). Dissecting Malicious Word, PDF Documents. International Journal of Science Engineering and Advance Technology, 3(3), 61-68. https://europub.co.uk./articles/-A-16473