Abstract
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techniques to exploit these redundancies. A general framework to evaluate the stealth of the proposed techniques is introduced and applied on an implementation for the IA-32 architecture. This evaluation proves that, whereas existing tools such as Hydan [1] are insecure, significant encoding rates can in fact be achieved at a high security level.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
El-Khalil, R., Keromytis, A.: Hydan: Hiding information in program binaries. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 187–199. Springer, Heidelberg (2004)
Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings. In: ACM SIGPLAN-SIGACT symposium on Principles of Programming Languages, pp. 311–324. ACM Press, New York (1999)
Stern, J., Hachez, G., Koeune, F., Quisquater, J.J.: Robust object watermarking: Application to code. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 368–378. Springer, Heidelberg (2000)
Simmons, G.J.: The prisoners’ problem and the subliminal channel. In: Advances in Cryptology, pp. 51–67 (1984)
Kerkhoffs, A.: La cryptographie militaire. Journal de Sciences Militaires 9, 5–38 (1883)
Anderson, R.J., Petitcolas, F.A.: On the limits of steganography. IEEE Journal of Selected Areas in Communications, 474–481 (1998)
Intel: IA-32 Intel Architecture Software Developer’s Manual (2003)
Massalin, H.: Superoptimizer: a look at the smallest program. In: Architectual Support for Programming Languages and Operating Systems, pp. 122–126. IEEE Computer Society Press, Los Alamitos (1987)
Aho, A., Sethi, R., Ullman, J.: Compilers, Principles, Techniques and Tools. Addison-Wesley, Reading (1986)
Kwan, M.: Gifshuffle (1998), http://www.darkside.com.au/gifshuffle/
De Sutter, B., De Bus, B., De Bosschere, K.: Sifting out the mud: Low level c++ code reuse. In: ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages and Applications, pp. 275–291 (2002)
Levine, J.: Linkers & Loaders. Morgan Kaufmann Publishers, San Francisco (2000)
Gloy, N., Smith, M.D.: Procedure placement using temporal-ordering information. ACM Transactions on Programming Languages and Systems 21, 977–1027 (1999)
De Bus, B., De Sutter, B., Van Put, L., Chanet, D., De Bosschere, K.: Link-time optimization of ARM binaries. In: ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, pp. 211–220 (2004)
Cox, I., Miller, M., Bloom, J.: Digital watermarking. Morgan Kaufmann, San Francisco (2002)
Katzenbeisser, S., Petitcolas, F.: Information hiding techniques for steganography and digital watermarking. Artech House (2000)
Davidson, R., Myhrvold, N.: Method and system for generating and auditing a signature for a computer program (1996) Microsoft Corporation, US5559884
Pieprzyk, J.: Fingerprints for copyright software protection. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol. 1729, pp. 178–190. Springer, Heidelberg (1999)
Holmes, K.: Computer software protection (1991) International Business Machines Corporation, US5287407
Venkatesan, R., Vazirani, V., Sinha, S.: A graph theoretic approach to software watermarking. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 157–168. Springer, Heidelberg (2001)
Collberg, C., Thomborson, C., Townsend, G.: Dynamic graph-based software watermarking. Technical report, Dept. of Computer Science, Univ. of Arizona (2004)
Curran, D., Cinneide, M.O., Hurley, N., Silvestre, G.: Dependency in software watermarking. In: Information and Communication Technologies: from Theory to Applications, pp. 569–570 (2004)
Sahoo, T.R., Collberg, C.: Software watermarking in the frequency domain: Implementation, analysis, and attacks. Technical report, Dept. of Computer Science, Univ. of Arizona (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anckaert, B., De Sutter, B., Chanet, D., De Bosschere, K. (2005). Steganography for Executables and Code Transformation Signatures. In: Park, Cs., Chee, S. (eds) Information Security and Cryptology – ICISC 2004. ICISC 2004. Lecture Notes in Computer Science, vol 3506. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11496618_31
Download citation
DOI: https://doi.org/10.1007/11496618_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26226-8
Online ISBN: 978-3-540-32083-8
eBook Packages: Computer ScienceComputer Science (R0)