[HTML][HTML] Maintaining interoperability in open source software: A case study of the Apache PDFBox project
Software interoperability is commonly achieved through the implementation of standards for
communication protocols or data representation formats. Standards documents are often …
communication protocols or data representation formats. Standards documents are often …
Breaking the specification: PDF certification
The Portable Document Format (PDF) is the de-facto standard for document exchange. The
PDF specification defines two different types of digital signatures to guarantee the …
PDF specification defines two different types of digital signatures to guarantee the …
Every Signature is Broken: On the Insecurity of Microsoft {Office's}{OOXML} Signatures
Microsoft Office is one of the most widely used applications for office documents. For
documents of prime importance, such as contracts and invoices, the content can be signed …
documents of prime importance, such as contracts and invoices, the content can be signed …
[PDF][PDF] Shadow Attacks: Hiding and Replacing Content in Signed PDFs.
Digitally signed PDFs are used in contracts and invoices to guarantee the authenticity and
integrity of their content. A user opening a signed PDF expects to see a warning in case of …
integrity of their content. A user opening a signed PDF expects to see a warning in case of …
Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of {OpenDocument} Signatures
OpenDocument is one of the major standards for interoperable office documents. Supported
by office suites like Apache OpenOffice, LibreOffice, and Microsoft Office, the …
by office suites like Apache OpenOffice, LibreOffice, and Microsoft Office, the …
DISV: Domain Independent Semantic Validation of Data Files
Data format specification languages such as PDF or HTML have been used extensively for
exchanging structured data over the internet. While receivers of data files (eg, PDF viewers …
exchanging structured data over the internet. While receivers of data files (eg, PDF viewers …
Strengthening Weak Links in the PDF Trust Chain
In many practical and security-critical formats, the interpretation of a document segment as a
Document Object Model (DOM) graph depends on a concept of reference and complex …
Document Object Model (DOM) graph depends on a concept of reference and complex …
Harnessing Lightweight Ciphers for PDF Encryption
A Chauhan, D Verma - arXiv preprint arXiv:2409.09428, 2024 - arxiv.org
Portable Document Format (PDF) is a file format which is used worldwide as de-facto
standard for exchanging documents. In fact this document that you are currently reading has …
standard for exchanging documents. In fact this document that you are currently reading has …
VIMz: Verifiable image manipulation using folding-based zkSNARKs
S Dziembowski, S Ebrahimi… - Cryptology ePrint …, 2024 - eprint.iacr.org
With the rise of generative AI technology, the media's credibility as a source of truth has
been significantly compromised. This highlights the need to verify the authenticity of media …
been significantly compromised. This highlights the need to verify the authenticity of media …
Modeling the dielectric constant of silicon-based nanocomposites using machine learning
SA Korchagin, YV Klinaev, DV Terin… - … on Actual Problems …, 2020 - ieeexplore.ieee.org
In this work, we solve the problem of predicting the dielectric constant of silicon-based
nanocomposites using machine learning methods. Mathematical models and programs …
nanocomposites using machine learning methods. Mathematical models and programs …