Practical Decryption Exfiltration: Breaking PDF Encryption

Practical Decryption Exfiltration: Breaking PDF Encryption

TheIACR via YouTube Direct link

Attacker Model

6 of 20

6 of 20

Attacker Model

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Practical Decryption Exfiltration: Breaking PDF Encryption

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 PDFex
  3. 3 Overview
  4. 4 Portable Document Format
  5. 5 Who uses PDF Encryption?
  6. 6 Attacker Model
  7. 7 PDF Encryption in a Nutshell
  8. 8 Gaps in PDF Encryption
  9. 9 Simple Content Overlay
  10. 10 Direct Exfiltration through PDF Forms
  11. 11 Direct Exfiltration via Hyperlinks
  12. 12 Direct Exfiltration with JavaScript
  13. 13 Malleability Gadgets
  14. 14 Prerequisites
  15. 15 Known Plaintext
  16. 16 Gadget Attacks
  17. 17 PDF Signatures
  18. 18 Closing Backchannels
  19. 19 Short Term Mitigation
  20. 20 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.