{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T07:12:37Z","timestamp":1773040357638,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,17]],"date-time":"2021-06-17T00:00:00Z","timestamp":1623888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"French Program Investissement d'Avenir and the Grenoble Alpes Cybersecurity Institute CYBER@ALPS under contract ANR-15-IDEX-02."}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,17]]},"DOI":"10.1145\/3437880.3460405","type":"proceedings-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T13:11:52Z","timestamp":1624281112000},"page":"35-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Exploitation and Sanitization of Hidden Data in PDF Files: Do Security Agencies Sanitize Their PDF Files?"],"prefix":"10.1145","author":[{"given":"Supriya","family":"Adhatarao","sequence":"first","affiliation":[{"name":"Univ. Grenoble Alpes, Inria, France, Grenoble, France"}]},{"given":"C\u00e9dric","family":"Lauradoux","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, Inria, France, Grenoble, France"}]}],"member":"320","published-online":{"date-parts":[[2021,6,21]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"DEF CON 17 Hacking Conference. 41--50","author":"Alonso Chema","year":"2009","unstructured":"Chema Alonso and Jos\u00e9 Palzon . 2009 . Tactical Fingerprinting using Foca . In DEF CON 17 Hacking Conference. 41--50 . Chema Alonso and Jos\u00e9 Palzon. 2009. Tactical Fingerprinting using Foca. In DEF CON 17 Hacking Conference. 41--50."},{"key":"e_1_3_2_2_2_1","volume-title":"Black Hat Europe","author":"Alonso Chema","year":"2009","unstructured":"Chema Alonso , Enrique Rando , Francisco Oca , and Antonio Guzm\u00c3n . 2009. Disclosing Private Information from Metadata, hidden info and lost data . In Black Hat Europe 2009 . Chema Alonso, Enrique Rando, Francisco Oca, and Antonio Guzm\u00c3n. 2009. Disclosing Private Information from Metadata, hidden info and lost data. In Black Hat Europe 2009."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179608"},{"key":"e_1_3_2_2_4_1","volume-title":"Extract Me If You Can: Abusing PDF Parsers in Malware Detectors. In 23rd Annual Network and Distributed System Security Symposium, NDSS","author":"Carmony Curtis","year":"2016","unstructured":"Curtis Carmony , Xunchao Hu , Heng Yin , Abhishek Vasisht Bhaskar , and Mu Zhang . 2016 . Extract Me If You Can: Abusing PDF Parsers in Malware Detectors. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016. The Internet Society. Curtis Carmony, Xunchao Hu, Heng Yin, Abhishek Vasisht Bhaskar, and Mu Zhang. 2016. Extract Me If You Can: Abusing PDF Parsers in Malware Detectors. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016. The Internet Society."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.04.062"},{"key":"e_1_3_2_2_6_1","volume-title":"d.]","author":"Faircloth Jeremy","unstructured":"Jeremy Faircloth . [n. d.] . Chapter 2 - Reconnaissance. In Penetration Tester's Open Source Toolkit (Fourth Edition) (fourth edition ed.), Jeremy Faircloth (Ed.). Syngress . Jeremy Faircloth. [n. d.]. Chapter 2 - Reconnaissance. In Penetration Tester's Open Source Toolkit (Fourth Edition) (fourth edition ed.), Jeremy Faircloth (Ed.). Syngress."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00144"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.131"},{"key":"e_1_3_2_2_9_1","volume-title":"Document management-Portable document format-Part 2: PDF 2.0. ISO ISO 32000--2:2017","author":"ISO.","unstructured":"ISO. 2008. Document management-Portable document format-Part 2: PDF 2.0. ISO ISO 32000--2:2017 . International Organization for Standardization , Geneva, Switzerland . ISO. 2008. Document management-Portable document format-Part 2: PDF 2.0. ISO ISO 32000--2:2017. International Organization for Standardization, Geneva, Switzerland."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/953460.953509"},{"key":"e_1_3_2_2_11_1","volume-title":"Twenty-Seventh Annual Computer Security Applications Conference, ACSAC","author":"Laskov Pavel","year":"2011","unstructured":"Pavel Laskov and Nedim Srndic . 2011 . Static detection of malicious JavaScriptbearing PDF documents . In Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011. ACM, 373--382. Pavel Laskov and Nedim Srndic. 2011. Static detection of malicious JavaScriptbearing PDF documents. In Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011. ACM, 373--382."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2018.2875879"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3332184"},{"key":"e_1_3_2_2_14_1","volume-title":"Fingerprinting an Organization Using Metadata of Public Documents. Master's thesis","author":"Mendelman Karl","unstructured":"Karl Mendelman . 2018. Fingerprinting an Organization Using Metadata of Public Documents. Master's thesis . University of Tartu , Estonia. Karl Mendelman. 2018. Fingerprinting an Organization Using Metadata of Public Documents. Master's thesis. University of Tartu, Estonia."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2591972"},{"key":"e_1_3_2_2_18_1","volume-title":"Microsoft Word Documents that Phone Home. (August","author":"Smith Richard M.","year":"2000","unstructured":"Richard M. Smith . 2000. Microsoft Word Documents that Phone Home. (August 2000 ). Retrieve on Internet Archive : Wayback Machine https:\/\/web.archive.org\/web\/20010203194100\/http:\/\/www.privacyfoundation.org\/advisories\/advWordBugs.html. Richard M. Smith. 2000. Microsoft Word Documents that Phone Home. (August 2000). Retrieve on Internet Archive: Wayback Machine https:\/\/web.archive.org\/web\/20010203194100\/http:\/\/www.privacyfoundation.org\/advisories\/advWordBugs.html."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420987"},{"key":"e_1_3_2_2_20_1","volume-title":"Detection of Malicious PDF Files Based on Hierarchical Document Structure. In 20th Annual Network and Distributed System Security Symposium, NDSS","author":"Srndic Nedim","year":"2013","unstructured":"Nedim Srndic and Pavel Laskov . 2013 . Detection of Malicious PDF Files Based on Hierarchical Document Structure. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013. The Internet Society. Nedim Srndic and Pavel Laskov. 2013. Detection of Malicious PDF Files Based on Hierarchical Document Structure. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013. The Internet Society."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.14"},{"key":"e_1_3_2_2_24_1","volume-title":"Workshop on Cyber Security Experimentation and Test, CSET","author":"Vaidya Tavish","year":"2017","unstructured":"Tavish Vaidya , Eric Burger , Micah Sherr , and Clay Shields . 2017 . Where art thou, Eve? Experiences laying traps for Internet eavesdroppers . In Workshop on Cyber Security Experimentation and Test, CSET 2017. USENIX Association. Tavish Vaidya, Eric Burger, Micah Sherr, and Clay Shields. 2017. Where art thou, Eve? Experiences laying traps for Internet eavesdroppers. In Workshop on Cyber Security Experimentation and Test, CSET 2017. USENIX Association."},{"key":"e_1_3_2_2_25_1","volume-title":"Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers. In 23rd Annual Network and Distributed System Security Symposium, NDSS","author":"Xu Weilin","year":"2016","unstructured":"Weilin Xu , Yanjun Qi , and David Evans . 2016 . Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016. The Internet Society. Weilin Xu, Yanjun Qi, and David Evans. 2016. Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016. The Internet Society."}],"event":{"name":"IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security","location":"Virtual Event Belgium","acronym":"IH&MMSec '21","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437880.3460405","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3437880.3460405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:26Z","timestamp":1750195466000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437880.3460405"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,17]]},"references-count":21,"alternative-id":["10.1145\/3437880.3460405","10.1145\/3437880"],"URL":"https:\/\/doi.org\/10.1145\/3437880.3460405","relation":{},"subject":[],"published":{"date-parts":[[2021,6,17]]},"assertion":[{"value":"2021-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}