Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security 2021
DOI: 10.1145/3437880.3460405
|View full text |Cite
|
Sign up to set email alerts
|

Exploitation and Sanitization of Hidden Data in PDF Files: Do Security Agencies Sanitize Their PDF Files?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…As such, the analysis of the threat landscape was used to clarify which systems/sensors are used for safe navigation and effective surveillance and to identify their vulnerabilities. Mandatory maritime sensors include radar and AIS, according to the SOLAS convention [37]. Therefore, to identify the relevant papers for maritime data fusion, the search criterion "radar and AIS fusion" was mainly utilized to discover the relations between radar and AIS in the context of data fusion.…”
Section: Findings Of the Literature Review Related To The Maritime Da...mentioning
confidence: 99%
“…As such, the analysis of the threat landscape was used to clarify which systems/sensors are used for safe navigation and effective surveillance and to identify their vulnerabilities. Mandatory maritime sensors include radar and AIS, according to the SOLAS convention [37]. Therefore, to identify the relevant papers for maritime data fusion, the search criterion "radar and AIS fusion" was mainly utilized to discover the relations between radar and AIS in the context of data fusion.…”
Section: Findings Of the Literature Review Related To The Maritime Da...mentioning
confidence: 99%
“…Others focus on privacy content in the file or sanitization [42]- [46]. Close related works [42], [47] focus on hidden data detection in PDF that can be used to collect threat intelligence on the entity that created the file.…”
Section: B Pdf Cdrmentioning
confidence: 99%
“…Others focus on privacy content in the file or sanitization [42]- [46]. Close related works [42], [47] focus on hidden data detection in PDF that can be used to collect threat intelligence on the entity that created the file. The extracted knowledge, such as printer names [47], internal domain names, operating systems, and personal information can be used against the organization.…”
Section: B Pdf Cdrmentioning
confidence: 99%
“…In Santa Clara County, HIV diagnoses fell more than 30% from 162 in 2019 to 115 in 2020 [3,4], as a decline that became more evident during the COVID-19 pandemic. At the Crane Center, the County of Santa Clara Public Health Department (SCCPHD) express testing clinic that offers free, anonymous, and confidential HIV testing, the number of HIV tests were consistent from 2017 to 2019 (1,329-1,360 HIV tests annually), but dropped in 2020 to less than half the tests administered during the previous year (544 HIV tests).…”
Section: Introduction Hiv Epidemiology and Covid-19mentioning
confidence: 99%