Binary Code Fingerprinting for Cybersecurity Application to Malicious Code Fingerprinting /

This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerabili...

Full description

Main Authors: Alrabaee, Saed. (Author, http://id.loc.gov/vocabulary/relators/aut), Debbabi, Mourad. (http://id.loc.gov/vocabulary/relators/aut), Shirani, Paria. (http://id.loc.gov/vocabulary/relators/aut), Wang, Lingyu. (http://id.loc.gov/vocabulary/relators/aut), Youssef, Amr. (http://id.loc.gov/vocabulary/relators/aut), Rahimian, Ashkan. (http://id.loc.gov/vocabulary/relators/aut), Nouh, Lina. (http://id.loc.gov/vocabulary/relators/aut), Mouheb, Djedjiga. (http://id.loc.gov/vocabulary/relators/aut), Huang, He. (http://id.loc.gov/vocabulary/relators/aut), Hanna, Aiman. (http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2020.
Edition:1st ed. 2020.
Series:Advances in Information Security, 78
Subjects:
Online Access:https://doi.org/10.1007/978-3-030-34238-8