Abstract
Malware has become increasingly prolific and severe in its consequences as information systems mature and users become more reliant on computing in their daily lives. As cybercrime becomes more complex in its strategies, an often-overlooked manner of propagation is through images. In recent years, several high-profile vulnerabilities in image libraries have opened the door for threat actors to steal money and information from unsuspecting users. This paper will explore the mechanisms by which these exploits function and how they can be avoided.
Faculty Advisor/Mentor
Yan Lu
Document Type
Paper
Disciplines
Computer Sciences | Graphics and Human Computer Interfaces | Information Security | Numerical Analysis and Scientific Computing | OS and Networks
DOI
10.25776/995a-mr43
Publication Date
11-30-2023
Upload File
wf_yes
Included in
Graphics and Human Computer Interfaces Commons, Information Security Commons, Numerical Analysis and Scientific Computing Commons, OS and Networks Commons
The Propagation and Execution of Malware in Images
Malware has become increasingly prolific and severe in its consequences as information systems mature and users become more reliant on computing in their daily lives. As cybercrime becomes more complex in its strategies, an often-overlooked manner of propagation is through images. In recent years, several high-profile vulnerabilities in image libraries have opened the door for threat actors to steal money and information from unsuspecting users. This paper will explore the mechanisms by which these exploits function and how they can be avoided.