Dissecting Malicious Word, PDF Documents

Abstract

Internet and computers are now a part of our daily routine life. With the development of network and information technology, E-mail has became increasingly popular and the society’s indispensable need. However, virus spreading via the E-mail is also increasing at an enormous rate. The E-mail attachment such as PDF Document, Microsoft Word Document, EXE program can spread viruses from one computer to another computer. This paper describes and analyses the various forms of the E-mail viruses via the Microsoft Word Documents and the PDF Documents. We describe the methodology to detect such E-mail viruses using tools such as OfficeMalscanner for Word Documents and PDF stream Dumper for PDF Documents.

Authors and Affiliations

K. Tanuja| Dept of C.S.E, S.R.K. Institute Of Technology, Enikepadu, Krishna dist, AP, India, CH. Praneeth| Dept of C.S.E, S.R.K. Institute Of Technology, Enikepadu, Krishna dist, AP, India, Dr D. Haritha| Dept of C.S.E, S.R.K. Institute Of Technology, Enikepadu, Krishna dist, AP, India

Keywords

Related Articles

Transmission Mechanism To Effectively Increase The Social Tv Viewing Experience By Cloud

Strong challenges occur on how to competently exploit cloud resources to make easy mobile services. We propose the design of a Cloud-based novel Mobile social TV system (CloudMoV). The system efficiently utilizes bot...

We rather pick a hop-by-hop approach. Such an approach is appropriate for the systems without MPLS conveyed. All the more particularly, every router can independently figure next hops, the same as what they do in Dij...

A Novel Algorithm For Similarity Calculation Of Image Patches

Coordinating composite representations with advanced face pictures is a testing issue which is of great enthusiasm to law authorization organizations. An algorithm was shown that uses multi-scale highlight extraction...

Sheltered Compound Vendor Data Apportioning For Vibrant Clusters In The Cloud

Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. Sharing data in a multiowner manner while preserving data and identity...

On-Chip AHB Bus Trace Analyzer for Real Time Tracing With Lossless Data Compression

The advanced micro controller bus Architecture (AMBA) is widely used as the on-chip bus in Systemon-Chip(SoC) designs. The important aspect of a SoC is not only which components or blocks it houses, but also how they...

Download PDF file
  • EP ID EP16473
  • DOI -
  • Views 317
  • Downloads 15

How To Cite

K. Tanuja, CH. Praneeth, Dr D. Haritha (2015). Dissecting Malicious Word, PDF Documents. International Journal of Science Engineering and Advance Technology, 3(3), 61-68. https://europub.co.uk/articles/-A-16473