Abstract

Malware has become increasingly prolific and severe in its consequences as information systems mature and users become more reliant on computing in their daily lives. As cybercrime becomes more complex in its strategies, an often-overlooked manner of propagation is through images. In recent years, several high-profile vulnerabilities in image libraries have opened the door for threat actors to steal money and information from unsuspecting users. This paper will explore the mechanisms by which these exploits function and how they can be avoided.

Faculty Advisor/Mentor

Yan Lu

Document Type

Paper

Disciplines

Computer Sciences | Graphics and Human Computer Interfaces | Information Security | Numerical Analysis and Scientific Computing | OS and Networks

DOI

10.25776/995a-mr43

Publication Date

11-30-2023

Upload File

wf_yes

Share

COinS
 

The Propagation and Execution of Malware in Images

Malware has become increasingly prolific and severe in its consequences as information systems mature and users become more reliant on computing in their daily lives. As cybercrime becomes more complex in its strategies, an often-overlooked manner of propagation is through images. In recent years, several high-profile vulnerabilities in image libraries have opened the door for threat actors to steal money and information from unsuspecting users. This paper will explore the mechanisms by which these exploits function and how they can be avoided.