Patent attributes
A computer-implemented method of analyzing the contents of a file in a visual document format to identify a potentially-fraudulent overlay is disclosed. The method includes receiving the file, iterating over a set of visually rendered elements within the file, and calculating, for each element in the set, a bounding box. Based on identifying a pair of elements having at least partially overlapping bounding boxes, such that a visible item in an overlaid element at least partially obscures an item in an underlying element that would otherwise be visible, an attack vector ontology is updated to include information on the overlaid and underlying element. This attack vector ontology may be used in training an automatic system to identify fraudulent documents and prevent their being printed, signed, and/or further used.