Title :
Research on the technology of concealing the character of binary codes based on equal transposition
Author :
Tian, Feng ; Zhang, Youwei ; Ma, Dengwei
Author_Institution :
Inf. Eng. Univ., Zhengzhou, China
Abstract :
The concealing of binary code is a key technology in the field of information security. Through in-depth study of this technology, it can not only provide theoretical support for detection of malicious code, but also play a role in promoting the development of network attack techniques. We combine the technology of equal transposition with the character concealing of binary code and achieve the target of character concealing by researching the technology of binary code´s equal transposition. At the same time, we build a prototype system which plays perfectly in character concealing after a relevant test.
Keywords :
binary codes; security of data; character concealing; equal transposition; information security; network attack techniques; Binary codes; Cryptography; Libraries; Registers; Software; Testing; Trojan horses; assemble code; binary code; character concealing; equal transposition;
Conference_Titel :
Software Engineering and Service Science (ICSESS), 2011 IEEE 2nd International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-9699-0
DOI :
10.1109/ICSESS.2011.5982482