Get the Whitepaper called Exploring Below the Surface of the GIFAR Iceberg. Reported at Black Hat 2008, GIFARs uses the concept of combining files such as a GIF images and a Java Archives (JAR) to enable malicious code execution. This paper explores GIFARs and the possible threats they expose.
You can download it from the following link: https://packetstormsecurity.com/files/download/76472/GIFAR-iceberg.pdf
Source: https://packetstormsecurity.com/files/76472/Exploring-Below-The-Surface-Of-The-GIFAR-Iceberg.html

