National Repository of Grey Literature 4 records found  Search took 0.00 seconds. 
Digital Steganography for Executables
Bever, Ľuboš ; Šimek, Václav (referee) ; Strnadel, Josef (advisor)
Steganography for executable files is the least common steganography. Research in this area has subsided after several, not many, attempts to implement it. The aim of this work is the implementation of existing methods and its modification proposal. Extensible software that has been created, can be also used to implement other methods. The implemented methods were properly tested,  evaluated and compared. The comparison results show, that the used instruction substitution method, roughly corresponds to its reference value 1/110, however the results are highly dependent on the input binaries. The proposed extension of this method averages a data rate of 1/84, which is only 1.5 times less than the value obtained from another existing implementation in which specialized software was used to search for equivalence classes. The maximum data rate obtained from test programs is 1/38.
Digital Steganography for Executables
Bever, Ľuboš ; Šimek, Václav (referee) ; Strnadel, Josef (advisor)
Steganography for executable files is the least common steganography. Research in this area has subsided after several, not many, attempts to implement it. The aim of this work is the implementation of existing methods and its modification proposal. Extensible software that has been created, can be also used to implement other methods. The implemented methods were properly tested,  evaluated and compared. The comparison results show, that the used instruction substitution method, roughly corresponds to its reference value 1/110, however the results are highly dependent on the input binaries. The proposed extension of this method averages a data rate of 1/84, which is only 1.5 times less than the value obtained from another existing implementation in which specialized software was used to search for equivalence classes. The maximum data rate obtained from test programs is 1/38.
Interactive disassembler for Intel 64 processors
Faltín, Tomáš ; Yaghob, Jakub (advisor) ; Kofroň, Jan (referee)
The aim of this thesis is to create disassembler-debugger for Intel64 processors. Disassembler loads instructions and instruction's format from XML files which implies future extensibility for new instructions and architecture. After inserting of a program disassembler converts its instructions to assembly language. Debugger is able to run and control the program's instruction flow by stepping over single instruction or by setting some breakpoints that stops the program. Debugger can also show program's threads and find some basic programming structures like if statements and loops. Powered by TCPDF (www.tcpdf.org)
Interactive disassembler for Intel 64 processors
Faltín, Tomáš ; Yaghob, Jakub (advisor) ; Kofroň, Jan (referee)
The aim of this thesis is to create disassembler-debugger for Intel64 processors. Disassembler loads instructions and instruction's format from XML files which implies future extensibility for new instructions and architecture. After inserting of a program disassembler converts its instructions to assembly language. Debugger is able to run and control the program's instruction flow by stepping over single instruction or by setting some breakpoints that stops the program. Debugger can also show program's threads and find some basic programming structures like if statements and loops. Powered by TCPDF (www.tcpdf.org)

Interested in being notified about new results for this query?
Subscribe to the RSS feed.