Preview

Digital Solutions and Artificial Intelligence Technologies

Advanced search

Undeclared File Architecture Features. Automated Office, Text Editor, Docx Format

https://doi.org/10.26794/3033-7097-2025-1-4-60-68

Abstract

The second paper of this series of articles suggests lifting the veil of secrecy of automated office file formats as a container for manually refining some hidden features. The article discusses an algorithm for implementing one such function — redirecting a hidden link to an active Internet resource. As mentioned earlier in the first part of the article, the increasing number of undeclared functions in the file architecture causes concern among the existing special services of states, which is fully justified by the practical lack of unified software and hardware systems for auditing injections of this kind. Studying simple software tools, unfortunately overlooked by security systems on local PCs and networks, will allow you to build a more powerful closed circuit in the workplace. The existing SIEM in a unified format for building rule bases for closed-circuit auditing does not currently contain ready-made algorithms for detecting extraneous files inside files of automated office formats. This factor needs to be corrected using self-written workplace rules individually. This series of articles does not provide practical instructions for harming the digital environment of the corporate circuit of organizations. The considered scenario of a simple injection with redirection of a link to an Internet resource (redirect function) assumes exclusively educational functions and warnings for information security specialists.

About the Authors

A. A. Ryzhenko
Financial University under the Government of the Russian Federation
Россия

Alexey A. Ryzhenko — Cand. Sci. (Tech.), Assoc. Prof. of the Information Safety Department

Moscow



S. I. Kozminych
Financial University under the Government of the Russian Federation; Plekhanov Russian University of Economics
Россия

Sergey I. Kozminykh — Dr. Sci. (Tech.), Assoc. Prof., Prof. of the Department of Applied Informatics and Information Security; Professor of Information Security Department

Moscow



References

1. Trusov A.N., Ivanchenko P.Y., Katsuro D.A. Editing and entering information into XML documents of automated information systems. Software Products and Systems. 2017;30(1):81–84. DOI: 10.15827/0236-235X.030.1.081-084

2. Sutyrkina E.A., Burmistrov A.N. Botnet detection via server logs analysis. Bulletin of the USU. The series “Mathematics and Information Technology”. 2021;2:63–74. URL: https://elibrary.ru/nliwpa

3. Smolyaninov V.A. Software methods for determining the meta-position of users of social networks. Current issues of the operation of security systems and secure telecommunication systems: Conference proceedings, Voronezh, June 09, 2022. Voronezh: Voronezh Institute of the Ministry of Internal Affairs of the Russian Federation; 2022:51–53. URL: https://www.elibrary.ru/qyardw

4. Kupriyanovskaya Yu.V., Kupriyanovsky V.P., Klimov A.A., Namiot D.E., Dolbnev A.V. et al. Smart container, smart port, BIM, Internet of Things and blockchain in the digital world trade system. International Journal of Open Information Technologies. 2018;6(3):49–94. URL: https://www.elibrary.ru/yrysiu

5. Bakhteev D.V., Shevyrtalov E.P. Methods of neutralizing standard and non-standard means of protecting a car as an element of committing theft and theft of vehicles. Bulletin of the Ural Law Institute of the Ministry of Internal Affairs of Russia. 2024;1(41):74–79. URL: https://cyberleninka.ru/article/n/sposoby-neytralizatsii-shtatnyh-i-neshtatnyh-sredstv-zaschity-avtomobilya-kak-element-soversheniya-ugonov-i-hischeniy-transportnyh/viewer

6. Eremchenko V.I. Modern problems of free trafficking of the means of committing and concealing crimes. Society and Law. 2017;2(60):195–197. URL: https://cyberleninka.ru/article/n/sovremennye-problemy-svobodnogo-oborota-sredstv-soversheniya-i-sokrytiya-prestupleniy/viewer

7. Nikiforova K.V., Okladova I.M. Overview technology com. development of an automation server. Forum of Young Scientists, 2019;4(32):791–797. URL: https://elibrary.ru/vuzifo

8. Avlasevich D.V., Dmitriev N.A., Kirillov A.A., & Bachinsky A.G. Using VPN Technology to Ensure Information Security. Forum of Young Scientists. 2020;3(43):12–18. URL: https://elibrary.ru/etgkxb

9. Zhuikov E.A. Development of a mathematical model for detecting software embedded devices. NBI Technologies. 2023;17(1):17–23. DOI: 10.15688/NBIT.jvolsu.2023.1.3

10. Tikhomirov N.A., Klyucharev P.G. The problem of monitoring information flows that occur during software assembly. Cybersecurity Issues, 2025;1(65):128–135. DOI: 10.21681/2311-3456-2025-1-128-135


Review

For citations:


Ryzhenko A.A., Kozminych S.I. Undeclared File Architecture Features. Automated Office, Text Editor, Docx Format. Digital Solutions and Artificial Intelligence Technologies. 2025;1(4):60-68. (In Russ.) https://doi.org/10.26794/3033-7097-2025-1-4-60-68

Views: 45

JATS XML


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 3033-7097 (Online)