Open access repository

Home Open access repository

In 2014, we launched our open-access repository which offers full text access to conference proceedings from many of our events including the INC and HAISA series. These papers are free to access and distribute (subject to citing the source).

» Openaccess proceedings » 4th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA 2009)

4th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA 2009)

4th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA 2009)
Athens, Greece, June 25-26, 2009
ISBN: 978-1-84102-230-7

Title: Data Hiding in the SWF Format and Spreading through
Social Network Services
Author(s): Alexandros Zaharis, Adamantini Martini, Christos Ilioudis
Reference: pp105-114
Keywords: SWF format, Data Hiding, Social Network Services, Computer Forensics
Abstract: This paper presents a unique way of hiding information inside the SWF Adobe® Flash®
Format. SWF has become popular because of its interaction with the end user along with its
captive graphics. Furthermore it is massively used by social networks for entertainment
reasons (flash games, presentations), as it is easily embedded in web pages. Adobe ® Flash ®
Player is used by over 2 million professionals and reaching 99.0% of Internet-enabled
desktops. The fact that SWF is so popular and can be found in large scale around the Internet,
along with the fact that most SWF applications developed look innocent, make the SWF
format a great carrier medium for hidden information to be spread without raising any
questions. For the first time, a method consisting of different hiding techniques is presented in
order to fully illustrate the potentials of hiding data in the SWF format and spreading them
through social network services. This technique can be utilized in order to understand the
danger of not thoroughly examining SWF format in a forensics investigation, while allowing
the development of a sufficient detection method of possible illegal activity, like child
pornography, through Social Networks.
Download count: 1989

How to get this paper:

Download a free PDF copy of this paperBuy this book at Lulu.com

PDF copy of this paper is free to download. You may distribute this copy providing you cite this page as the source.