Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techniques to exploit these redundancies. A general framework to evaluate the stealth of the proposed techniques is introduced and applied on an implementation for the IA-32 architecture. This evaluation proves that, whereas existing tools such as Hydan [1] are insecure, significant encoding rates can in fact be achieved at a high security level. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Anckaert, B., De Sutter, B., Chanet, D., & De Bosschere, K. (2005). Steganography for executables and code transformation signatures. In Lecture Notes in Computer Science (Vol. 3506, pp. 425–439). Springer Verlag. https://doi.org/10.1007/11496618_31
Mendeley helps you to discover research relevant for your work.