Steganography for executables and code transformation signatures

20Citations
Citations of this article
35Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techniques to exploit these redundancies. A general framework to evaluate the stealth of the proposed techniques is introduced and applied on an implementation for the IA-32 architecture. This evaluation proves that, whereas existing tools such as Hydan [1] are insecure, significant encoding rates can in fact be achieved at a high security level. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Anckaert, B., De Sutter, B., Chanet, D., & De Bosschere, K. (2005). Steganography for executables and code transformation signatures. In Lecture Notes in Computer Science (Vol. 3506, pp. 425–439). Springer Verlag. https://doi.org/10.1007/11496618_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free