Skip to main content

Steganography for Executables and Code Transformation Signatures

  • Conference paper
Information Security and Cryptology – ICISC 2004 (ICISC 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3506))

Included in the following conference series:

Abstract

Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techniques to exploit these redundancies. A general framework to evaluate the stealth of the proposed techniques is introduced and applied on an implementation for the IA-32 architecture. This evaluation proves that, whereas existing tools such as Hydan [1] are insecure, significant encoding rates can in fact be achieved at a high security level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. El-Khalil, R., Keromytis, A.: Hydan: Hiding information in program binaries. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 187–199. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  2. Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings. In: ACM SIGPLAN-SIGACT symposium on Principles of Programming Languages, pp. 311–324. ACM Press, New York (1999)

    Google Scholar 

  3. Stern, J., Hachez, G., Koeune, F., Quisquater, J.J.: Robust object watermarking: Application to code. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 368–378. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  4. Simmons, G.J.: The prisoners’ problem and the subliminal channel. In: Advances in Cryptology, pp. 51–67 (1984)

    Google Scholar 

  5. Kerkhoffs, A.: La cryptographie militaire. Journal de Sciences Militaires 9, 5–38 (1883)

    Google Scholar 

  6. Anderson, R.J., Petitcolas, F.A.: On the limits of steganography. IEEE Journal of Selected Areas in Communications, 474–481 (1998)

    Google Scholar 

  7. Intel: IA-32 Intel Architecture Software Developer’s Manual (2003)

    Google Scholar 

  8. Massalin, H.: Superoptimizer: a look at the smallest program. In: Architectual Support for Programming Languages and Operating Systems, pp. 122–126. IEEE Computer Society Press, Los Alamitos (1987)

    Google Scholar 

  9. Aho, A., Sethi, R., Ullman, J.: Compilers, Principles, Techniques and Tools. Addison-Wesley, Reading (1986)

    Google Scholar 

  10. Kwan, M.: Gifshuffle (1998), http://www.darkside.com.au/gifshuffle/

  11. De Sutter, B., De Bus, B., De Bosschere, K.: Sifting out the mud: Low level c++ code reuse. In: ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages and Applications, pp. 275–291 (2002)

    Google Scholar 

  12. Levine, J.: Linkers & Loaders. Morgan Kaufmann Publishers, San Francisco (2000)

    Google Scholar 

  13. Gloy, N., Smith, M.D.: Procedure placement using temporal-ordering information. ACM Transactions on Programming Languages and Systems 21, 977–1027 (1999)

    Article  Google Scholar 

  14. De Bus, B., De Sutter, B., Van Put, L., Chanet, D., De Bosschere, K.: Link-time optimization of ARM binaries. In: ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, pp. 211–220 (2004)

    Google Scholar 

  15. Cox, I., Miller, M., Bloom, J.: Digital watermarking. Morgan Kaufmann, San Francisco (2002)

    Google Scholar 

  16. Katzenbeisser, S., Petitcolas, F.: Information hiding techniques for steganography and digital watermarking. Artech House (2000)

    Google Scholar 

  17. Davidson, R., Myhrvold, N.: Method and system for generating and auditing a signature for a computer program (1996) Microsoft Corporation, US5559884

    Google Scholar 

  18. Pieprzyk, J.: Fingerprints for copyright software protection. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol. 1729, pp. 178–190. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  19. Holmes, K.: Computer software protection (1991) International Business Machines Corporation, US5287407

    Google Scholar 

  20. Venkatesan, R., Vazirani, V., Sinha, S.: A graph theoretic approach to software watermarking. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 157–168. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  21. Collberg, C., Thomborson, C., Townsend, G.: Dynamic graph-based software watermarking. Technical report, Dept. of Computer Science, Univ. of Arizona (2004)

    Google Scholar 

  22. Curran, D., Cinneide, M.O., Hurley, N., Silvestre, G.: Dependency in software watermarking. In: Information and Communication Technologies: from Theory to Applications, pp. 569–570 (2004)

    Google Scholar 

  23. Sahoo, T.R., Collberg, C.: Software watermarking in the frequency domain: Implementation, analysis, and attacks. Technical report, Dept. of Computer Science, Univ. of Arizona (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Anckaert, B., De Sutter, B., Chanet, D., De Bosschere, K. (2005). Steganography for Executables and Code Transformation Signatures. In: Park, Cs., Chee, S. (eds) Information Security and Cryptology – ICISC 2004. ICISC 2004. Lecture Notes in Computer Science, vol 3506. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11496618_31

Download citation

  • DOI: https://doi.org/10.1007/11496618_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26226-8

  • Online ISBN: 978-3-540-32083-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics