Steganography for Executables and Code Transformation Signatures View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2005

AUTHORS

Bertrand Anckaert , Bjorn De Sutter , Dominique Chanet , Koen De Bosschere

ABSTRACT

Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techniques to exploit these redundancies. A general framework to evaluate the stealth of the proposed techniques is introduced and applied on an implementation for the IA-32 architecture. This evaluation proves that, whereas existing tools such as Hydan [1] are insecure, significant encoding rates can in fact be achieved at a high security level. More... »

PAGES

425-439

References to SciGraph publications

  • 2000. Robust Object Watermarking: Application to Code in INFORMATION HIDING
  • 1999-10-22. Fingerprints for Copyright Software Protection in INFORMATION SECURITY
  • 2001. A Graph Theoretic Approach to Software Watermarking in INFORMATION HIDING
  • 2004. Hydan: Hiding Information in Program Binaries in INFORMATION AND COMMUNICATIONS SECURITY
  • Book

    TITLE

    Information Security and Cryptology – ICISC 2004

    ISBN

    978-3-540-26226-8
    978-3-540-32083-8

    Author Affiliations

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/11496618_31

    DOI

    http://dx.doi.org/10.1007/11496618_31

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1028969833


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Electronics and Information Systems Department, Ghent University, Sint-Pietersnieuwstraat 41, 9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Anckaert", 
            "givenName": "Bertrand", 
            "id": "sg:person.013243217423.37", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013243217423.37"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Electronics and Information Systems Department, Ghent University, Sint-Pietersnieuwstraat 41, 9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "De Sutter", 
            "givenName": "Bjorn", 
            "id": "sg:person.014214375307.41", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014214375307.41"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Electronics and Information Systems Department, Ghent University, Sint-Pietersnieuwstraat 41, 9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Chanet", 
            "givenName": "Dominique", 
            "id": "sg:person.014127656317.52", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014127656317.52"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Electronics and Information Systems Department, Ghent University, Sint-Pietersnieuwstraat 41, 9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "De Bosschere", 
            "givenName": "Koen", 
            "id": "sg:person.013465130107.96", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013465130107.96"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-540-30191-2_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000580130", 
              "https://doi.org/10.1007/978-3-540-30191-2_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-30191-2_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000580130", 
              "https://doi.org/10.1007/978-3-540-30191-2_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/997163.997194", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004207335"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/292540.292569", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004514909"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/330249.330254", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016173492"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1201/1079/43263.28.6.20001201/30373.5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1019895337"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-47790-x_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035200980", 
              "https://doi.org/10.1007/3-540-47790-x_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-47790-x_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035200980", 
              "https://doi.org/10.1007/3-540-47790-x_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45496-9_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035550837", 
              "https://doi.org/10.1007/3-540-45496-9_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/582419.582445", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039452920"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/10719724_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041405884", 
              "https://doi.org/10.1007/10719724_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/10719724_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041405884", 
              "https://doi.org/10.1007/10719724_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/49.668971", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061177876"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/ictta.2004.1307890", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094804972"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2005", 
        "datePublishedReg": "2005-01-01", 
        "description": "Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techniques to exploit these redundancies. A general framework to evaluate the stealth of the proposed techniques is introduced and applied on an implementation for the IA-32 architecture. This evaluation proves that, whereas existing tools such as Hydan [1] are insecure, significant encoding rates can in fact be achieved at a high security level.", 
        "editor": [
          {
            "familyName": "Park", 
            "givenName": "Choon-sik", 
            "type": "Person"
          }, 
          {
            "familyName": "Chee", 
            "givenName": "Seongtaek", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/11496618_31", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-540-26226-8", 
            "978-3-540-32083-8"
          ], 
          "name": "Information Security and Cryptology \u2013 ICISC 2004", 
          "type": "Book"
        }, 
        "name": "Steganography for Executables and Code Transformation Signatures", 
        "pagination": "425-439", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1028969833"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/11496618_31"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "8a01969f972d873194589af58e89acb569aec860f005a6202aedc0e98807d4ca"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/11496618_31", 
          "https://app.dimensions.ai/details/publication/pub.1028969833"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T08:05", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000359_0000000359/records_29216_00000001.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F11496618_31"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/11496618_31'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/11496618_31'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/11496618_31'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/11496618_31'


     

    This table displays all metadata directly associated to this object as RDF triples.

    128 TRIPLES      23 PREDICATES      38 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/11496618_31 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author Na92cf871a1bf4155978a7da1bb5b28cc
    4 schema:citation sg:pub.10.1007/10719724_25
    5 sg:pub.10.1007/3-540-45496-9_12
    6 sg:pub.10.1007/3-540-47790-x_15
    7 sg:pub.10.1007/978-3-540-30191-2_15
    8 https://doi.org/10.1109/49.668971
    9 https://doi.org/10.1109/ictta.2004.1307890
    10 https://doi.org/10.1145/292540.292569
    11 https://doi.org/10.1145/330249.330254
    12 https://doi.org/10.1145/582419.582445
    13 https://doi.org/10.1145/997163.997194
    14 https://doi.org/10.1201/1079/43263.28.6.20001201/30373.5
    15 schema:datePublished 2005
    16 schema:datePublishedReg 2005-01-01
    17 schema:description Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techniques to exploit these redundancies. A general framework to evaluate the stealth of the proposed techniques is introduced and applied on an implementation for the IA-32 architecture. This evaluation proves that, whereas existing tools such as Hydan [1] are insecure, significant encoding rates can in fact be achieved at a high security level.
    18 schema:editor N91fe56e43ed341a1b03312caa015fdaa
    19 schema:genre chapter
    20 schema:inLanguage en
    21 schema:isAccessibleForFree true
    22 schema:isPartOf N5fb28a12433348e9a83ee39ac68c944c
    23 schema:name Steganography for Executables and Code Transformation Signatures
    24 schema:pagination 425-439
    25 schema:productId N10dfb525383c4f7db628adf7a298bcca
    26 N62995eed05f2443185aa8661c72cf20d
    27 N98475493828841c4a0ecc9e417d37237
    28 schema:publisher N3e627581ba7a4bfcab865aa70b1f9470
    29 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028969833
    30 https://doi.org/10.1007/11496618_31
    31 schema:sdDatePublished 2019-04-16T08:05
    32 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    33 schema:sdPublisher N045b7988db794fcdb1b11e701aced09c
    34 schema:url https://link.springer.com/10.1007%2F11496618_31
    35 sgo:license sg:explorer/license/
    36 sgo:sdDataset chapters
    37 rdf:type schema:Chapter
    38 N045b7988db794fcdb1b11e701aced09c schema:name Springer Nature - SN SciGraph project
    39 rdf:type schema:Organization
    40 N10dfb525383c4f7db628adf7a298bcca schema:name doi
    41 schema:value 10.1007/11496618_31
    42 rdf:type schema:PropertyValue
    43 N27f9f704f88e46259fc75207a2ad665b rdf:first sg:person.013465130107.96
    44 rdf:rest rdf:nil
    45 N2d9ffd7ffb214acf910de41759071171 rdf:first sg:person.014214375307.41
    46 rdf:rest Ne6c222605fdd4f5c8172c30fbcac6157
    47 N3e627581ba7a4bfcab865aa70b1f9470 schema:location Berlin, Heidelberg
    48 schema:name Springer Berlin Heidelberg
    49 rdf:type schema:Organisation
    50 N5fb28a12433348e9a83ee39ac68c944c schema:isbn 978-3-540-26226-8
    51 978-3-540-32083-8
    52 schema:name Information Security and Cryptology – ICISC 2004
    53 rdf:type schema:Book
    54 N62995eed05f2443185aa8661c72cf20d schema:name dimensions_id
    55 schema:value pub.1028969833
    56 rdf:type schema:PropertyValue
    57 N7552d5ae6d3240bea6288199a49c22a7 schema:familyName Chee
    58 schema:givenName Seongtaek
    59 rdf:type schema:Person
    60 N91fe56e43ed341a1b03312caa015fdaa rdf:first Nd170ada1d13e4e78ad59deb9cb9f9431
    61 rdf:rest N9ce6dbdc277c437a8f4f4840dcbbea3f
    62 N98475493828841c4a0ecc9e417d37237 schema:name readcube_id
    63 schema:value 8a01969f972d873194589af58e89acb569aec860f005a6202aedc0e98807d4ca
    64 rdf:type schema:PropertyValue
    65 N9ce6dbdc277c437a8f4f4840dcbbea3f rdf:first N7552d5ae6d3240bea6288199a49c22a7
    66 rdf:rest rdf:nil
    67 Na92cf871a1bf4155978a7da1bb5b28cc rdf:first sg:person.013243217423.37
    68 rdf:rest N2d9ffd7ffb214acf910de41759071171
    69 Nd170ada1d13e4e78ad59deb9cb9f9431 schema:familyName Park
    70 schema:givenName Choon-sik
    71 rdf:type schema:Person
    72 Ne6c222605fdd4f5c8172c30fbcac6157 rdf:first sg:person.014127656317.52
    73 rdf:rest N27f9f704f88e46259fc75207a2ad665b
    74 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    75 schema:name Information and Computing Sciences
    76 rdf:type schema:DefinedTerm
    77 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    78 schema:name Data Format
    79 rdf:type schema:DefinedTerm
    80 sg:person.013243217423.37 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    81 schema:familyName Anckaert
    82 schema:givenName Bertrand
    83 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013243217423.37
    84 rdf:type schema:Person
    85 sg:person.013465130107.96 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    86 schema:familyName De Bosschere
    87 schema:givenName Koen
    88 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013465130107.96
    89 rdf:type schema:Person
    90 sg:person.014127656317.52 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    91 schema:familyName Chanet
    92 schema:givenName Dominique
    93 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014127656317.52
    94 rdf:type schema:Person
    95 sg:person.014214375307.41 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    96 schema:familyName De Sutter
    97 schema:givenName Bjorn
    98 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014214375307.41
    99 rdf:type schema:Person
    100 sg:pub.10.1007/10719724_25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041405884
    101 https://doi.org/10.1007/10719724_25
    102 rdf:type schema:CreativeWork
    103 sg:pub.10.1007/3-540-45496-9_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035550837
    104 https://doi.org/10.1007/3-540-45496-9_12
    105 rdf:type schema:CreativeWork
    106 sg:pub.10.1007/3-540-47790-x_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035200980
    107 https://doi.org/10.1007/3-540-47790-x_15
    108 rdf:type schema:CreativeWork
    109 sg:pub.10.1007/978-3-540-30191-2_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000580130
    110 https://doi.org/10.1007/978-3-540-30191-2_15
    111 rdf:type schema:CreativeWork
    112 https://doi.org/10.1109/49.668971 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061177876
    113 rdf:type schema:CreativeWork
    114 https://doi.org/10.1109/ictta.2004.1307890 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094804972
    115 rdf:type schema:CreativeWork
    116 https://doi.org/10.1145/292540.292569 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004514909
    117 rdf:type schema:CreativeWork
    118 https://doi.org/10.1145/330249.330254 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016173492
    119 rdf:type schema:CreativeWork
    120 https://doi.org/10.1145/582419.582445 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039452920
    121 rdf:type schema:CreativeWork
    122 https://doi.org/10.1145/997163.997194 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004207335
    123 rdf:type schema:CreativeWork
    124 https://doi.org/10.1201/1079/43263.28.6.20001201/30373.5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1019895337
    125 rdf:type schema:CreativeWork
    126 https://www.grid.ac/institutes/grid.5342.0 schema:alternateName Ghent University
    127 schema:name Electronics and Information Systems Department, Ghent University, Sint-Pietersnieuwstraat 41, 9000, Ghent, Belgium
    128 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...