Analysis of Using Equivalent Instructions at the Hidden Embedding of Information Into the Executable Files

In this paper, the authors examine the problems and their possible solutions on the specifics of using equivalent instructions for the hidden embedding of information into the executable and library files. This paper considers an example of hidden embedding into an executable file of exe format or into a similar elf-format for the Unix/Linux systems. In order to embed information into an executable code by the synonyms substitution method, it is suggested to use instructions that execute one and the same operation and have similar length, but that are encrypted by different opcodes.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
Journal of Theoretical and Applied Information Technology
Topic:
Security
Format:
PDF