STEGEX - Steganography Within the Portable Executable Medium

Advisor Information

William Mahoney

Location

Dr. C.C. and Mabel L. Criss Library

Presentation Type

Poster

Start Date

4-3-2016 9:00 AM

End Date

4-3-2016 10:30 AM

Abstract

I present a set of methods that can be used to hide data within a portable executable, and another method that hides data as a steganography null cipher. I use inherent redundancy within the PE format and unused space to hide information. The null cipher method creates a mapping of bytes between a secret file and a carrier file as a form of steganography. These methods can be used as a form of covert communication or for watermarking. In the paper I first go through the design mentality of the methods. Next I talk about the actual implementation of some of those methods in python. Then I analyse these methods for individual strengths and weaknesses. Finally I suggest potential improvements to the code that would make the methods more efficient.

This document is currently not available here.

COinS
 
Mar 4th, 9:00 AM Mar 4th, 10:30 AM

STEGEX - Steganography Within the Portable Executable Medium

Dr. C.C. and Mabel L. Criss Library

I present a set of methods that can be used to hide data within a portable executable, and another method that hides data as a steganography null cipher. I use inherent redundancy within the PE format and unused space to hide information. The null cipher method creates a mapping of bytes between a secret file and a carrier file as a form of steganography. These methods can be used as a form of covert communication or for watermarking. In the paper I first go through the design mentality of the methods. Next I talk about the actual implementation of some of those methods in python. Then I analyse these methods for individual strengths and weaknesses. Finally I suggest potential improvements to the code that would make the methods more efficient.