- Добавил: buratino
- Дата: 29-02-2020, 18:56
- Комментариев: 0
Название: Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting (Advances in Information Security)
Автор: Saed Alrabaee, Mourad Debbabi, Paria Shirani
Издательство: Springer
Год: 2020
Формат: true pdf/epub
Страниц: 247
Размер: 20.9 Mb
Язык: English
This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse detection, free open-source software identification, vulnerability search, and authorship attribution.
Автор: Saed Alrabaee, Mourad Debbabi, Paria Shirani
Издательство: Springer
Год: 2020
Формат: true pdf/epub
Страниц: 247
Размер: 20.9 Mb
Язык: English
This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse detection, free open-source software identification, vulnerability search, and authorship attribution.