Steganography for executables and code transformation signatures

  • Authors:
  • Bertrand Anckaert;Bjorn De Sutter;Dominique Chanet;Koen De Bosschere

  • Affiliations:
  • Electronics and Information Systems Department, Ghent University, Ghent, Belgium;Electronics and Information Systems Department, Ghent University, Ghent, Belgium;Electronics and Information Systems Department, Ghent University, Ghent, Belgium;Electronics and Information Systems Department, Ghent University, Ghent, Belgium

  • Venue:
  • ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techniques to exploit these redundancies. A general framework to evaluate the stealth of the proposed techniques is introduced and applied on an implementation for the IA-32 architecture. This evaluation proves that, whereas existing tools such as Hydan [1] are insecure, significant encoding rates can in fact be achieved at a high security level.