ABSTRACT
We consider the application of a genetic algorithm (GA) to the problem of hiding information in program executables. In a nutshell, our approach is to re-order instructions in a program in such way that aims to maximize the amount of data that can be embedded while, at the same time, ensuring the functionality of the executable is not altered. In this work, we focus on the problem of identifying a large set of instructions which may be re-ordered, and some initial results on the IA-64 architecture are then presented that illustrate the potential benefit of such an approach.*
- B. Anckaert, B. De Sutter, D. Chanet, and Kan De Bosschere, "Steganography for executables and code transformation signatures," In Proceeding of the 7<sup>th</sup> ICISS, Beijing, China, pp. 425--439, 2011. Google ScholarDigital Library
- J. Blasco, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda, and M.A. Orellana-Quiros "Steganalysis of Hydan," In ECSPT,, SpringerLink, pp. 132--144, 2009.Google Scholar
- J. Cazalas, T.R. Andel, and J.T. McDonald, "Analysis and categorical application of LSB steganalysis techniques," In The Journal of Information Warfare, 13(3), 2014.Google Scholar
- R. El-Khalil arid A.D. Keromytis, "Hydan: hiding information in program binaries," In ICICS, LNCS, Malaga, Spain, 2004, pp. 187--199, 2004.Google Scholar
- J. Landsborough, S. Fugate, S. Harding, "Removing the kitchen sink." In GECCO, ACM, Madrid, Spain, pp. 833--838, 2015. Google ScholarDigital Library
- E. Schulte, J. Dorn, S. Harding, S. Forrest, and W. Weimer, "Post-compiler software optimization for reducing energy," In SIGARCH Computational Architecture News, 42(1), pp. 639--652, 2014. Google ScholarDigital Library
- E. Schulte, J. DiLorenzo, W. Weimer, and S. Forrest, "Automated repair of binary and assembly programs for cooperating embedded devices," In 18<sup>th</sup> ASPLOS, ACM, New York, NY, pp. 317--328, 2013. Google ScholarDigital Library
Index Terms
- A change would do you good: GA-Based approach for hiding data in program executables
Recommendations
Information Hiding Using Ant Colony Optimization Algorithm
This paper aims to find an effective and efficient information hiding method used for protecting secret information by embedding it in a cover media such as images. Finding the optimal set of the image pixel bits to be substituted by the secret message ...
An adaptive steganographic method based on the measurement of just noticeable distortion profile
This paper presents an adaptive steganographic method based on just noticeable distortion (JND) profile measurement. According to the input requirements, our method can produce a higher quality or higher embedding capacity stego-image. In the embedding ...
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis
Statistical steganalysis schemes detect the existence of secret information embedded by steganography. The x^2-detection and Regular-Singular (RS)-attack methods are two well-known statistical steganalysis schemes used against LSB (least significant bit)...
Comments