Filters








3 Hits in 0.92 sec

Steganalysis of Hydan [chapter]

Jorge Blasco, Julio C. Hernandez-Castro, Juan M. E. Tapiador, Arturo Ribagorda, Miguel A. Orellana-Quiros
2009 IFIP Advances in Information and Communication Technology  
Abstract Hydan is a steganographic tool which can be used to hide any kind of information inside executable files.  ...  Our system uses statistical analysis of instruction set distribution to distinguish between files with no hidden information and files that have been modified with Hydan.  ...  Steganalysis of Hydan Changes introduced by Hydan into assembler code can modify different properties of the original executable file.  ... 
doi:10.1007/978-3-642-01244-0_12 fatcat:n4iwx5fuljf2lj464xnnjvismq

Steganography for Executables and Code Transformation Signatures [chapter]

Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, Koen De Bosschere
2005 Lecture Notes in Computer Science  
This evaluation proves that, whereas existing tools such as Hydan [1] are insecure, significant encoding rates can in fact be achieved at a high security level.  ...  This paper identifies three cover-specific redundancies of executable programs and presents steganographic techniques to exploit these redundancies.  ...  (FWO) and Ghent University, member of the HiPEAC network.  ... 
doi:10.1007/11496618_31 fatcat:vklux6jqmnazxeozwomv6um5re

Detection and Mitigation of Anti-Forensics

Emre Caglar Hosgor
2020 Zenodo  
Abstract—With the advances in IT, digital forensics became an important part of the juridical system.  ...  Categorization of, detection the use and mitigation against anti-forensics' related resources do improve digital forensic analysis processes.  ...  In all stenography methods, encryption can be used to provide extra protection against steganalysis.  ... 
doi:10.5281/zenodo.4425258 fatcat:wlrjhlnflbbypez4xtzeqwhwey