Dissecting Malicious Word, PDF Documents
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 3
Abstract
Internet and computers are now a part of our daily routine life. With the development of network and information technology, E-mail has became increasingly popular and the society’s indispensable need. However, virus spreading via the E-mail is also increasing at an enormous rate. The E-mail attachment such as PDF Document, Microsoft Word Document, EXE program can spread viruses from one computer to another computer. This paper describes and analyses the various forms of the E-mail viruses via the Microsoft Word Documents and the PDF Documents. We describe the methodology to detect such E-mail viruses using tools such as OfficeMalscanner for Word Documents and PDF stream Dumper for PDF Documents.
Authors and Affiliations
K. Tanuja| Dept of C.S.E, S.R.K. Institute Of Technology, Enikepadu, Krishna dist, AP, India, CH. Praneeth| Dept of C.S.E, S.R.K. Institute Of Technology, Enikepadu, Krishna dist, AP, India, Dr D. Haritha| Dept of C.S.E, S.R.K. Institute Of Technology, Enikepadu, Krishna dist, AP, India
Adaptive Voltage Control Based Three-Phase Inverter Interfacing With Ultracapacitor For Renewable Energy Systems
Now a days the use of the renewable energy systems has been increased in the distributed generation. This paper presents an Adaptive voltage control theory for the three phase system, which is feeded by solar PV syste...
Fast Keyword Search Assumption In The Random Oracle (RO) Model
This proposes searchable public key ciphertexts with hidden structures (SPCHS) for keyword seek as quickly as conceivable without giving up semantic security of the encoded keywords. In SPCHS, all keyword searchable...
Implementation of An Efficient Gate Level Modified Square-Root Carry Select Adder Using HDL
Contribution of this work is reduce the area and power of the CSLA by a simple gate level modification. Based on this modification CSLA architecture have been developed and compared with the regular SQRT CSLA archite...
A Novel Method For Computing Top-K Routing Plans Based On Keyword-Element Relationship
Hunting down words anyplace in the record should be possible easily utilizing Keyword. Watchword hunt are a decent option down a subject inquiry when you don't have the foggiest idea about the standard subject headin...
Evaluating Cost and Performance Of Adaptive Encryption Architecture for Cloud Database
The cloud database as a service is novel paradigms that can be support several Internet-based applications, its adoption requires the solution of the information confidentiality problems. We proposed a novel architec...