Detecting Hydan: Statistical Methods For Classifying The Use Of Hydan Based Stegonagraphy In Executable Files

It is known that HYDAN changes the statistical distribution of Sub and Add calls in the assembly code to embed the “hidden data”. Before this paper, there were no publicly released tools or methods available to detect HYDAN. The methods previously used to detect HYDAN have been inefficient and involved extensive manual processes that could not be easily automated. This paper presents a method to take the assembly code (using a disassembler) and to feed this into R, a statistical language, in order to detect if the file has been altered steganographically.

Never miss a story from Craig Wright (Bitcoin SV is the original Bitcoin)