Using digital images to spread executable code on Internet
dc.contributor.author | Gómez, Roberto | |
dc.contributor.author | Ramírez, Gabriel | |
dc.contributor.editor | Eichler, Gerald | |
dc.contributor.editor | Kropf, Peter | |
dc.contributor.editor | Lechner, Ulrike | |
dc.contributor.editor | Meesad, Phayung | |
dc.contributor.editor | Unger, Herwig | |
dc.date.accessioned | 2019-01-11T09:33:38Z | |
dc.date.available | 2019-01-11T09:33:38Z | |
dc.date.issued | 2010 | |
dc.description.abstract | Steganography is defined as covered writing and it has been used to achieve confidentiality. Most of research in this domain has focused in just sending plain data. In this paper we use steganography as a way to spread executable code instead of just communicating a secret message. The application of our proposal may contrast, could be using for spreading malicious code or for protecting software copyright like a water marking alive. We present our implementation of this scheme with a developed tool and hence look in a direction that has not looked at detail so far. | en |
dc.identifier.isbn | 978-3-88579-259-8 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/19033 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | 10th International Conferenceon Innovative Internet Community Systems (I2CS) – Jubilee Edition 2010 – | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-165 | |
dc.title | Using digital images to spread executable code on Internet | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 383 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 371 | |
gi.conference.date | June 3-5, 2010 | |
gi.conference.location | Bangkok, Thailand | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1