Computer Science ›› 2016, Vol. 43 ›› Issue (1): 207-210.doi: 10.11896/j.issn.1002-137X.2016.01.046

Previous Articles     Next Articles

Research of PE File Information Hiding Based on Import Table Migration

TIAN Zu-wei, LI Yong-fan and LIU Yang   

  • Online:2018-12-01 Published:2018-12-01

Abstract: On the base of analyzing the import table of PE file,using the work principle of Windows loader and the uncertainty of PE file import table’s storage location,an algorithm based on the import table migration was proposed.Information is hidden in the original import table space of PE file.Theory analysis and experiment result show that the algorithm overcomes the disadvantages of previous hiding information schemes,such as hidden information convergence and destruction of import table,which improves hidden and anti-attack ability.

Key words: PE file,Information hiding,Import table,Import table migration

[1] Petzold C.Windows程序设计(第5版珍藏版)[M].方敏,张胜,梁路平,等译.北京:清华大学出版社,2010:333-382
[2] Zaidan A A,Zaidan B B,Alanazi O H,et al.Novel approach for high (secure and rate) data hidden within triplex space for executable file[J].Scientific Research and Essayss,2010,5(15):1965-1977
[3] Long Fei-yu,Liu Jia-yong,Yuan Xi Software watermark based on structure transform of PE file import table[J].Journal of Computer Applications,2010,0(1):217-219(in Chinese)龙飞宇,刘嘉勇,袁熹.一种变换PE文件引入表结构的软件水印[J].计算机应用,2010,30(1):217-219
[4] Duanmu Qing-feng,Wang Yan-bo,Zhang Xiong-wei, et al.A spread spectrum software watermarking scheme based on the improt functions[J].Journal of Computer Research and Deve-lopment,2009,6(Suppl.):88-92(in Chinese) 端木庆峰,王衍波,张雄伟,等.基于导入函数引用次数的扩频软件水印方案[J].计算机研究与发展,2009,46(Suppl.):88-92
[5] Zhou Qing-lei,Li bin.Double software watermark scheme based on tamper-proofing[J].Computer Engineering,2013,9(7):185-188(in Chinese)周清雷,李斌.基于防篡改的双重软件水印方案[J].计算机工程,2013,39(7):185-188
[6] Zhang Meng,Chen Gou-xi,Zhang Peng-cheng.Executable file backdoor steganographic algorithm with highly efficient[J].Application Research of Computers,2013,0(4):1198-1200(in Chinese)张萌,陈够喜,张鹏程.高效可执行文件后门隐写算法[J].计算机应用研究,2013,30(4):1198-1200
[7] Jang J,Ji H,Hong J M,et al.Protecting Android applications with steganography-based software watermarking[C]∥Proceedings of the 28th Annual ACM Symposium on Applied Computing.Coimbra,2013:1657-1658
[8] Wei Wei-min,Liu Kun,Wan Xiao-peng.High capacity information hiding based on PE file format[J].Journal of Nanjing University of Science and Technology,2015,9(1):45-49(in Chinese)魏为民,刘锟,万晓鹏.PE文件格式的大容量信息隐藏技术[J].南京理工大学学报,2015,9(1):45-49
[9] 刘家超.基于行为分析的未知PE病毒检测技术研究[D].北京:北京邮电大学,2014
[10] Ji Yi-mu,Zhu Tong-hui,Chai Bo-zhou,et al.Hybrid encryption scheme and performance analsysi for user’s privacy in cloud[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2015,7(5):631-638(in Chinese)季一木,朱曈晖,柴博周,等.云环境下用户隐私混合加密方案及其性能分析[J].重庆邮电大学学报(自然科学版),2015,27(5):631-638

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!