{"title":"如何交换指令中游:嵌入算法的程序隐写","authors":"Ryan Gabrys, Luis Martinez, Sunny Fugate","doi":"10.1145/3384217.3384224","DOIUrl":null,"url":null,"abstract":"In this work, we propose an encoding/decoding algorithm for program executable steganography. Some salient features of our approach is that unlike previous work it does not require the introduction of new instructions, which may be detectable. Furthermore, our scheme does not require storing the locations of where changes in the program executable are made.","PeriodicalId":205173,"journal":{"name":"Proceedings of the 7th Symposium on Hot Topics in the Science of Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"How to swap instructions midstream: an embedding algorithm for program steganography\",\"authors\":\"Ryan Gabrys, Luis Martinez, Sunny Fugate\",\"doi\":\"10.1145/3384217.3384224\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this work, we propose an encoding/decoding algorithm for program executable steganography. Some salient features of our approach is that unlike previous work it does not require the introduction of new instructions, which may be detectable. Furthermore, our scheme does not require storing the locations of where changes in the program executable are made.\",\"PeriodicalId\":205173,\"journal\":{\"name\":\"Proceedings of the 7th Symposium on Hot Topics in the Science of Security\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-08-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 7th Symposium on Hot Topics in the Science of Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3384217.3384224\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 7th Symposium on Hot Topics in the Science of Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3384217.3384224","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
How to swap instructions midstream: an embedding algorithm for program steganography
In this work, we propose an encoding/decoding algorithm for program executable steganography. Some salient features of our approach is that unlike previous work it does not require the introduction of new instructions, which may be detectable. Furthermore, our scheme does not require storing the locations of where changes in the program executable are made.