DocumentCode
2731311
Title
Research on the technology of concealing the character of binary codes based on equal transposition
Author
Tian, Feng ; Zhang, Youwei ; Ma, Dengwei
Author_Institution
Inf. Eng. Univ., Zhengzhou, China
fYear
2011
fDate
15-17 July 2011
Firstpage
884
Lastpage
889
Abstract
The concealing of binary code is a key technology in the field of information security. Through in-depth study of this technology, it can not only provide theoretical support for detection of malicious code, but also play a role in promoting the development of network attack techniques. We combine the technology of equal transposition with the character concealing of binary code and achieve the target of character concealing by researching the technology of binary code´s equal transposition. At the same time, we build a prototype system which plays perfectly in character concealing after a relevant test.
Keywords
binary codes; security of data; character concealing; equal transposition; information security; network attack techniques; Binary codes; Cryptography; Libraries; Registers; Software; Testing; Trojan horses; assemble code; binary code; character concealing; equal transposition;
fLanguage
English
Publisher
ieee
Conference_Titel
Software Engineering and Service Science (ICSESS), 2011 IEEE 2nd International Conference on
Conference_Location
Beijing
Print_ISBN
978-1-4244-9699-0
Type
conf
DOI
10.1109/ICSESS.2011.5982482
Filename
5982482
Link To Document