• DocumentCode
    2731311
  • Title

    Research on the technology of concealing the character of binary codes based on equal transposition

  • Author

    Tian, Feng ; Zhang, Youwei ; Ma, Dengwei

  • Author_Institution
    Inf. Eng. Univ., Zhengzhou, China
  • fYear
    2011
  • fDate
    15-17 July 2011
  • Firstpage
    884
  • Lastpage
    889
  • Abstract
    The concealing of binary code is a key technology in the field of information security. Through in-depth study of this technology, it can not only provide theoretical support for detection of malicious code, but also play a role in promoting the development of network attack techniques. We combine the technology of equal transposition with the character concealing of binary code and achieve the target of character concealing by researching the technology of binary code´s equal transposition. At the same time, we build a prototype system which plays perfectly in character concealing after a relevant test.
  • Keywords
    binary codes; security of data; character concealing; equal transposition; information security; network attack techniques; Binary codes; Cryptography; Libraries; Registers; Software; Testing; Trojan horses; assemble code; binary code; character concealing; equal transposition;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Engineering and Service Science (ICSESS), 2011 IEEE 2nd International Conference on
  • Conference_Location
    Beijing
  • Print_ISBN
    978-1-4244-9699-0
  • Type

    conf

  • DOI
    10.1109/ICSESS.2011.5982482
  • Filename
    5982482