scholarly journals ImageDetox: Method for the Neutralization of Malicious Code Hidden in Image Files

Symmetry ◽  
2020 ◽  
Vol 12 (10) ◽  
pp. 1621
Author(s):  
Dong-Seob Jung ◽  
Sang-Joon Lee ◽  
Ieck-Chae Euom

Malicious codes may cause virus infections or threats of ransomware through symmetric encryption. Moreover, various bypassing techniques such as steganography, which refers to the hiding of malicious code in image files, have been devised. Unknown or new malware hidden in an image file in the form of malicious code is difficult to detect using most representative reputation- or signature-based antivirus methods. In this paper, we propose the use of ImageDetox method to neutralize malicious code hidden in an image file even in the absence of any prior information regarding the signatures or characteristics of the code. This method is composed of four modules: image file extraction, image file format analysis, image file conversion, and the convergence of image file management modules. To demonstrate the effectiveness of the proposed method, 30 image files with hidden malicious codes were used in an experiment. The malicious codes were selected from 48,220 recent malicious codes purchased from VirusTotal (a commercial application programming interface (API)). The experimental results showed that the detection rate of viruses was remarkably reduced. In addition, image files from which the hidden malicious code had previously been removed using a nonlinear transfer function maintained nearly the same quality as that of the original image; in particular, the difference could not be distinguished by the naked eye. The proposed method can also be utilized to prevent security threats resulting from the concealment of confidential information in image files with the aim of leaking such threats.

2018 ◽  
Vol 9 (1) ◽  
pp. 24-31
Author(s):  
Rudianto Rudianto ◽  
Eko Budi Setiawan

Availability the Application Programming Interface (API) for third-party applications on Android devices provides an opportunity to monitor Android devices with each other. This is used to create an application that can facilitate parents in child supervision through Android devices owned. In this study, some features added to the classification of image content on Android devices related to negative content. In this case, researchers using Clarifai API. The result of this research is to produce a system which has feature, give a report of image file contained in target smartphone and can do deletion on the image file, receive browser history report and can directly visit in the application, receive a report of child location and can be directly contacted via this application. This application works well on the Android Lollipop (API Level 22). Index Terms— Application Programming Interface(API), Monitoring, Negative Content, Children, Parent.


Author(s):  
C Sun ◽  
D Guo ◽  
H Gao ◽  
L Zou ◽  
H Wang

In order to manage the version files and maintain the latest version of the computer-aided design (CAD) files in asynchronous collaborative systems, one method of version merging for CAD files is proposed to resolve the problem based on feature extraction. First of all, the feature information is extracted based on the feature attribute of CAD files and stored in a XML feature file. Then, analyse the feature file, and the feature difference set is obtained by the given algorithm. Finally, the merging result of the difference set and the master files with application programming interface (API) interface functions is achieved, and then the version merging of CAD files is also realized. The application in Catia validated that the proposed method is feasible and valuable in engineering.


Author(s):  
Hiroki Takatsuka ◽  
Seiki Tokunaga ◽  
Sachio Saiki ◽  
Shinsuke Matsumoto ◽  
Masahide Nakamura

Purpose The purpose of this paper is to develop a facade for seamlessly using locating services and enabling easy development of an application with indoor and outdoor location information without being aware of the difference of individual services. To achieve this purpose, in this paper, a unified locating service, called KULOCS (Kobe-University Unified LOCating Service), which horizontally integrates the heterogeneous locating services, is proposed. Design/methodology/approach By focusing on technology-independent elements [when], [where] and [who] in location queries, KULOCS integrates data and operations of the existing locating services. In the data integration, a method where the time representation, the locations and the namespace are consolidated by the Unix time, the location labels and the alias table, respectively, is proposed. Based on the possible combinations of the three elements, an application-neutral application programming interface (API) for the operation integration is derived. Findings Using KULOCS, various practical services are enabled. In addition, the experimental evaluation shows the practical feasibility by comparing cases with or without KULOCS. The result shows that KULOCS reduces the effort of application development, especially when the number of locating services becomes large. Originality/value KULOCS works as a seamless facade with the underlying locating services, the users and applications consume location information easily and efficiently, without knowing concrete services actually locating target objects.


Author(s):  
Xin Luo ◽  
Merrill Warkentin

The continuous evolution of information security threats, coupled with increasing sophistication of malicious codes and the greater flexibility in working practices demanded by organizations and individual users, have imposed further burdens on the development of effective anti-malware defenses. Despite the fact that the IT community is endeavoring to prevent and thwart security threats, the Internet is perceived as the medium that transmits not only legitimate information but also malicious codes. In this cat-and-mouse predicament, it is widely acknowledged that, as new security countermeasures arise, malware authors are always able to learn how to manipulate the loopholes or vulnerabilities of these technologies, and can thereby weaponize new streams of malicious attacks. From e-mail attachments embedded with Trojan horses to recent advanced malware attacks such as Gozi programs, which compromise and transmit users’ highly sensitive information in a clandestine way, malware continues to evolve to be increasingly surreptitious and deadly. This trend of malware development seems foreseeable, yet making it increasingly arduous for organizations and/or individuals to detect and remove malicious codes and to defend against profit-driven perpetrators in the cyber world. This article introduces new malware threats such as ransomware, spyware, and rootkits, discusses the trends of malware development, and provides analysis for malware defenses. Keywords: Ransomware, Spyware, Anti-Virus, Malware, Malicious Code, Background Various forms of malware have been a part of the computing environment since before the implementation of the public Internet. However, the Internet’s ubiquity has ushered in an explosion in the severity and complexity of various forms of malicious applications delivered via increasingly ingenious methods. The original malware attacks were perpetrated via e-mail attachments, but new vulnerabilities have been identified and exploited by a variety of perpetrators who range from merely curious hackers to sophisticated organized criminals and identify thieves. In an earlier manuscript (Luo & Warkentin, 2005), the authors established the basic taxonomy of malware that included various types of computer viruses (boot sector viruses, macro viruses, etc.), worms, and Trojan horses. Since that time, numerous new forms of malicious code have been found “in the wild.”


2014 ◽  
Vol 4 (6) ◽  
pp. 358-367 ◽  
Author(s):  
Lindsey A. Olsen ◽  
Clifford G. Robinson ◽  
Guangrong R. He ◽  
H. Omar Wooten ◽  
Sridhar Yaddanapudi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document