Abstract: In the realm of cybersecurity, distinguishing between benign and malicious software, also known as malware, is a critical task. This paper presents a methodology for automating the ...
By putting conflicting metadata in LNK files, a researcher found four new ways to spoof targets, hide arguments, and run unintended programs in Windows Explorer.