File:Vulnerability analysis of HD photo image viewer applications (IA vulnerabilitynal109453285).pdf

Page contents not supported in other languages.
This is a file from the Wikimedia Commons
Source: Wikipedia, the free encyclopedia.
Go to page
next page →
next page →
next page →

Original file(1,275 × 1,650 pixels, file size: 2.36 MB, MIME type: application/pdf, 206 pages)

Summary

Vulnerability analysis of HD photo image viewer applications   (Wikidata search (Cirrus search) Wikidata query (SPARQL)  Create new Wikidata item based on this file)
Author
Juan, Clifford C.
image of artwork listed in title parameter on this page
Title
Vulnerability analysis of HD photo image viewer applications
Publisher
Monterey, California. Naval Postgraduate School
Description

The introduction of Microsoft's new graphics file format, Windows Media Photo, into the mainstream market in 2006 has been one of the most interesting developments in the digital world. The file format, which has since been renamed to HD Photo in November of 2006, is being touted as the successor to the ubiquitous JPEG image format, as well as the eventual de facto standard in the digital photography market. With massive efforts already underway to increase the software support of this file format, to make available support for digital camera makers to incorporate it into their products, and to propose the file format to the Joint Photography Experts Group in order to make HD Photo as a standard itself, HD Photo is poised to become as widespread as any of the common image file formats today. This provides the motivation into studying whether the HD Photo file format can be used as a vehicle to compromise a user s system. This work addresses the security of handling the HD Photo file format as it pertains to image viewer applications. Whenever an application is updated to accommodate a new file format, it is possible that the application in question can be vulnerable to exploitation. This is a concern, especially if a malformed instance of that file format can make the application to deviate from its specified behavior and cause the execution of arbitrary code. This thesis investigates if some of the existing applications today that render image files are susceptible to compromise by opening a malformed HD Photo image file. The goal of this thesis is to test the security of various image viewer applications compatible with the HD Photo file format. We modified MiniFuzz, an automated fuzzing tool, to conduct mutation-based smart fuzzing and generation-based fuzzing. The test instrumentation worked correctly, but the test cases did not reveal any security vulnerabilities.


Subjects: Photography; Digital techniques; Photographs; Computer science; Marketing; Computer programs; High definition television; Images, Photographic
Language English
Publication date September 2007
Current location
IA Collections: navalpostgraduateschoollibrary; fedlink
Accession number
vulnerabilitynal109453285
Source
Internet Archive identifier: vulnerabilitynal109453285
https://archive.org/download/vulnerabilitynal109453285/vulnerabilitynal109453285.pdf
Permission
(Reusing this file)
Approved for public release, distribution unlimited

Licensing

Public domain
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code. Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.

Captions

Add a one-line explanation of what this file represents

Items portrayed in this file

depicts

application/pdf

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current23:03, 25 July 2020Thumbnail for version as of 23:03, 25 July 20201,275 × 1,650, 206 pages (2.36 MB)FEDLINK - United States Federal Collection vulnerabilitynal109453285 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #32117)
No pages on the English Wikipedia use this file (pages on other projects are not listed).

Metadata