skip to main content
10.1145/3319619.3321905acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
research-article

A change would do you good: GA-Based approach for hiding data in program executables

Published:13 July 2019Publication History

ABSTRACT

We consider the application of a genetic algorithm (GA) to the problem of hiding information in program executables. In a nutshell, our approach is to re-order instructions in a program in such way that aims to maximize the amount of data that can be embedded while, at the same time, ensuring the functionality of the executable is not altered. In this work, we focus on the problem of identifying a large set of instructions which may be re-ordered, and some initial results on the IA-64 architecture are then presented that illustrate the potential benefit of such an approach.*

References

  1. B. Anckaert, B. De Sutter, D. Chanet, and Kan De Bosschere, "Steganography for executables and code transformation signatures," In Proceeding of the 7<sup>th</sup> ICISS, Beijing, China, pp. 425--439, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Blasco, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda, and M.A. Orellana-Quiros "Steganalysis of Hydan," In ECSPT,, SpringerLink, pp. 132--144, 2009.Google ScholarGoogle Scholar
  3. J. Cazalas, T.R. Andel, and J.T. McDonald, "Analysis and categorical application of LSB steganalysis techniques," In The Journal of Information Warfare, 13(3), 2014.Google ScholarGoogle Scholar
  4. R. El-Khalil arid A.D. Keromytis, "Hydan: hiding information in program binaries," In ICICS, LNCS, Malaga, Spain, 2004, pp. 187--199, 2004.Google ScholarGoogle Scholar
  5. J. Landsborough, S. Fugate, S. Harding, "Removing the kitchen sink." In GECCO, ACM, Madrid, Spain, pp. 833--838, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. E. Schulte, J. Dorn, S. Harding, S. Forrest, and W. Weimer, "Post-compiler software optimization for reducing energy," In SIGARCH Computational Architecture News, 42(1), pp. 639--652, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. E. Schulte, J. DiLorenzo, W. Weimer, and S. Forrest, "Automated repair of binary and assembly programs for cooperating embedded devices," In 18<sup>th</sup> ASPLOS, ACM, New York, NY, pp. 317--328, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A change would do you good: GA-Based approach for hiding data in program executables

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      GECCO '19: Proceedings of the Genetic and Evolutionary Computation Conference Companion
      July 2019
      2161 pages
      ISBN:9781450367486
      DOI:10.1145/3319619

      Copyright © 2019 Public Domain

      This paper is authored by an employee(s) of the United States Government and is in the public domain. Non-exclusive copying or redistribution is allowed, provided that the article citation is given and the authors and agency are clearly identified as its source.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 July 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,669of4,410submissions,38%

      Upcoming Conference

      GECCO '24
      Genetic and Evolutionary Computation Conference
      July 14 - 18, 2024
      Melbourne , VIC , Australia
    • Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader