ImageDetox: Method for the Neutralization of Malicious Code Hidden in Image Files

被引:7
作者
Jung, Dong-Seob [1 ]
Lee, Sang-Joon [2 ]
Euom, Ieck-Chae [3 ]
机构
[1] HUNESION Co Ltd, Seoul 06072, South Korea
[2] Chonnam Natl Univ, Sch Business Adm, Gwangju 61186, South Korea
[3] Chonnam Natl Univ, Syst Secur Res Ctr, Gwangju 61186, South Korea
来源
SYMMETRY-BASEL | 2020年 / 12卷 / 10期
关键词
malicious code image; neutralization; steganography; antivirus; image format conversion; nonlinear transfer function;
D O I
10.3390/sym12101621
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Malicious codes may cause virus infections or threats of ransomware through symmetric encryption. Moreover, various bypassing techniques such as steganography, which refers to the hiding of malicious code in image files, have been devised. Unknown or new malware hidden in an image file in the form of malicious code is difficult to detect using most representative reputation- or signature-based antivirus methods. In this paper, we propose the use of ImageDetox method to neutralize malicious code hidden in an image file even in the absence of any prior information regarding the signatures or characteristics of the code. This method is composed of four modules: image file extraction, image file format analysis, image file conversion, and the convergence of image file management modules. To demonstrate the effectiveness of the proposed method, 30 image files with hidden malicious codes were used in an experiment. The malicious codes were selected from 48,220 recent malicious codes purchased from VirusTotal (a commercial application programming interface (API)). The experimental results showed that the detection rate of viruses was remarkably reduced. In addition, image files from which the hidden malicious code had previously been removed using a nonlinear transfer function maintained nearly the same quality as that of the original image; in particular, the difference could not be distinguished by the naked eye. The proposed method can also be utilized to prevent security threats resulting from the concealment of confidential information in image files with the aim of leaking such threats.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 32 条
[1]  
Al-Sanjary OI, 2020, 2020 IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND INTELLIGENT SYSTEMS (I2CACIS 2020), P97, DOI [10.1109/I2CACIS49202.2020.9140186, 10.1109/i2cacis49202.2020.9140186]
[2]  
[Anonymous], 2012, ITSCC COMMON CRITERI
[3]  
[Anonymous], 2019, VIRUSTOTAL PREMIUM S
[4]  
[Anonymous], 2018, THREATPOST STEALTHY
[5]  
[Anonymous], **NON-TRADITIONAL**
[6]  
[Anonymous], **NON-TRADITIONAL**
[7]  
[Anonymous], 2012, HUNESION I ONENET
[8]  
[Anonymous], 2016, VIRUSBULLETIN IT WOR
[9]  
AVTEST, 2019, MALW STAT
[10]   Development of a Platform for Augmented Reality-Based Speech Language Therapy [J].
Bae, In-Ho ;
Lee, Ju-A ;
Park, Hee-June ;
Kwon, Soon-Bok .
COMMUNICATION SCIENCES AND DISORDERS-CSD, 2018, 23 (02) :462-476