Analysis of Using Equivalent Instructions at the Hidden Embedding of Information Into the Executable Files

In this paper, the authors examine the problems and their possible solutions on the specifics of using equivalent instructions for the hidden embedding of information into the executable and library files. This paper considers an example of hidden embedding into an executable file of exe format or into a similar elf-format for the Unix/Linux systems. In order to embed information into an executable code by the synonyms substitution method, it is suggested to use instructions that execute one and the same operation and have similar length, but that are encrypted by different opcodes.

Spotlight

CyberMaxx

We built CyberMaxx with one goal in mind: to be the industry’s leading trusted partner in preventing, detecting, and responding to cyber attacks. Equipped with a 24/7/365 security operations center and a team of cybersecurity experts, our managed security services were designed to help you increase compliance, eliminate talent shortages, and keep your organization out of the headlines so you can spend your time focusing on what’s most important.

OTHER WHITEPAPERS
news image

Security White Paper for Synappx Applications and Services

whitePaper | September 28, 2022

Synappx application services help bring smarter office experiences. They are designed to help optimize hybrid collaboration experiences. Synappx application services are protected by a robust, layered security system to ensure the system and its components are not opening points of vulnerability for your data or networks. Through a combination of world-class technology providers including Microsoft Azure, Google Workspace and security best practices, your use of the Synappx application services helps keep your information safe and secure while helping you enhance productivity in your office.

Read More
news image

Threat Connect Cyber Survey Report

whitePaper | January 4, 2022

Whether you are in financial services, farming, or public infrastructure, the security threat to organizations has never been greater. Today, almost every company is a technology company in some shape or form and this can be a soft underbelly - open to attack. Cyber risk is the fastest-growing risk faced by businesses globally. A wide range of statistics and sources make it clear that attackers have become even more proficient over recent years, using automation to exploit vulnerabilities at an accelerated pace and frequency. Threats are even more widespread and complex than before.

Read More
news image

NMS Security Architecture Considerations & Approaches

whitePaper | August 26, 2022

The SolarWinds compromise became public in December 2020 and was a massive wake up to the industry. Likely a state-sponsored attack, it compromised potentially thousands of governments and other high-profile organisations across the globe. Many organisations are currently in damage control following the breach. Many of them are unsure if the perpetrators have entered, spread and are still persistent within their environment - even after they shut down the SolarWinds Platforms.

Read More
news image

Cyber Security State of Tech in 2022

whitePaper | August 4, 2022

The Coronavirus pandemic accelerated technology adoption in ways thought unimaginable just a few short years ago. But in the background and often without much fanfare, cybercrime grew far worse. Threat actors continued their work – often backed by millions of dollars from hostile foreign governments – to penetrate networks and wreak havoc on digital infrastructures

Read More
news image

X-Force Threat Intelligence Index 2022

whitePaper | September 12, 2022

The world continues to grapple with a lasting pandemic, shifts to work-from-home and back-to-office, and geopolitical changes spawning a constant drone of mistrust. All of this equates to chaos, and it is in chaos that cybercriminals thrive.

Read More
news image

Cybersecurity Whitepaper 2018

whitePaper | December 12, 2019

Most of the Small to medium-sized companies are unaware about the ways in which they’re vulnerable. More than 45% mistakenly believe they’re not a viable victim. They are just too small a target in comparison to larger organizations and tend to have a blind eye towards the cyber threats they face, which is in sharp contrast to what attackers think.

Read More

Spotlight

CyberMaxx

We built CyberMaxx with one goal in mind: to be the industry’s leading trusted partner in preventing, detecting, and responding to cyber attacks. Equipped with a 24/7/365 security operations center and a team of cybersecurity experts, our managed security services were designed to help you increase compliance, eliminate talent shortages, and keep your organization out of the headlines so you can spend your time focusing on what’s most important.

Events