• Title/Summary/Keyword: Corrupted Digital File

Search Result 5, Processing Time 0.022 seconds

Analysis and Detection of Malicious Data Hidden in Slack Space on OOXML-based Corrupted MS-Office Digital Files

  • Sangwon Na;Hyung-Woo Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.149-156
    • /
    • 2023
  • OOXML-based MS-Office digital files are extensively utilized by businesses and organizations worldwide. However, OOXML-based MS-Office digital files are vulnerable to forgery and corruption attack by including hidden suspicious information, which can lead to activating malware or shell code being hidden in the file. Such malicious code can cause a computer system to malfunction or become infected with ransomware. To prevent such attacks, it is necessary to analyze and detect the corruption of OOXML-based MS-Office files. In this paper, we examine the weaknesses of the existing OOXML-based MS-Office file structure and analyzes how concealment and forgery are performed on MS-Office digital files. As a result, we propose a system to detect hidden data effectively and proactively respond to ransomware attacks exploiting MS-Office security vulnerabilities. Proposed system is designed to provide reliable and efficient detection of hidden data in OOXML-based MS-Office files, which can help organizations protect against potential security threats.

File Carving: JPEG Image Fragmentation Point Detection for Digital Forensics (파일 카빙: 디지털 포렌식을 위한 JPEG 이미지 단편화 지점 감지)

  • Lkham, Nurzed;Park, Dong-Joo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.245-247
    • /
    • 2012
  • We know that JPEG image format is one of the most popular image formats in the digital area and distribution of digital photographic drawing it is interested frequently in certain types of forensic investigation. In most case, corrupted images are shown gaudiness with the boundary of the corrupted parts. In the paper, we propose a technique to carve correct JPEG images using transformation method and the approach can be used for JPEG image file carving tool development.

Recovery Corrupted Video Files using Time Information (시간 정보를 활용한 동영상 파일 복원 기법)

  • Na, Gihyun;Shim, Kyu-Sun;Byun, Jun-Seok;Kim, Eun-Soo;Lee, Joong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.12
    • /
    • pp.1492-1500
    • /
    • 2015
  • In recent crime scene, there is the captured crime scene video at least one. So video files recorded on storage media often provide important evidence. Criminals often attempt to destroy storage saved crime scene video. For this reason recovery of a damaged or deleted video file is important to resolve criminal cases in aspects of digital forensic. In the recent, there is a study to recover video file based on video frames, but it is very poor time efficiency when the connecting video frames. This paper proposed advanced frame-based recovery technique of a damaged video files using time information. We suggest a new connecting algorithm to connect video frames using recorded time information in front of video frame. We also evaluate performance in aspects of time and experiment result shows that proposed method improves performance.

Design and Implementation of a ML-based Detection System for Malicious Script Hidden Corrupted Digital Files (머신러닝 기반 손상된 디지털 파일 내부 은닉 악성 스크립트 판별 시스템 설계 및 구현)

  • Hyung-Woo Lee;Sangwon Na
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.1-9
    • /
    • 2023
  • Malware files containing concealed malicious scripts have recently been identified within MS Office documents frequently. In response, this paper describes the design and implementation of a system that automatically detects malicious digital files using machine learning techniques. The system is proficient in identifying malicious scripts within MS Office files that exploit the OLE VBA macro functionality, detecting malicious scripts embedded within the CDH/LFH/ECDR internal field values through OOXML structure analysis, and recognizing abnormal CDH/LFH information introduced within the OOXML structure, which is not conventionally referenced. Furthermore, this paper presents a mechanism for utilizing the VirusTotal malicious script detection feature to autonomously determine instances of malicious tampering within MS Office files. This leads to the design and implementation of a machine learning-based integrated software. Experimental results confirm the software's capacity to autonomously assess MS Office file's integrity and provide enhanced detection performance for arbitrary MS Office files when employing the optimal machine learning model.

Floral Image Make-up - Centered on Georgia O'Keeffe's Paintings - (Floral Image Make-up에 관한 연구 - 조지아 오키프(Georgia O'Keeffe)의 작품을 중심으로 -)

  • Kim, Hyo-Sook;Kang, In-Ae
    • Journal of the Korean Home Economics Association
    • /
    • v.43 no.11 s.213
    • /
    • pp.97-107
    • /
    • 2005
  • Ed- the file appears to be corrupted, and in many sections (these are highlighted) I cannot read it. I presume it has been copied from another format, maybe Hangul 2004. The purpose of this study was to determine a method of make-up image extraction from specific paintings and also to create cyber make-up models according to the images. For this study, Georgia O'Keeffee's floral paintings were analyzed and their colors were compiled to make color palettes. This study attempted to approach floral image make-up which applies specific paintings through the digital mode in the manner of computer graphics. The results of this study were as follows: First, we found romantic images, including feminine, lovely and soft images by Y, GY and RP group colors, in 'Two Calla Lillies on Pink'. Second, we found modem images, including urban, up-to-date and cool images by G, GY and B group colors, in 'Blue and Green Music'. Third, we found sexy images, including brilliant, tempting and daring by R, B and G group colors, in 'Music-Pink and Blue'. To summarize, the images of the paintings were similar to those of the make-up models.