Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-1 of 1 total results
Hiding Malicious Content in PDF Documents
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 121 other file format. This will not invalidate the digital signature, as no bits of the actual file were altered. This met hod is known as the Dali Attack, named after the famous painter [4], [5]. The first demonstration of the attack was
https://arxiv.org/pdf/1201.0397
Average Rating (0 votes)