Binary Code Fingerprinting for Cybersecurity Application to Malicious Code Fingerprinting /
This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerabili...
Main Authors: | , , , , , , , , , |
---|---|
Corporate Author: | |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2020.
|
Edition: | 1st ed. 2020. |
Series: | Advances in Information Security,
78 |
Subjects: | |
Online Access: | https://doi.org/10.1007/978-3-030-34238-8 |
Table of Contents:
- 1 Introduction
- 2 Binary Analysis Overview
- 3 Compiler Provenance Attribution
- 4 Library Function Identification
- 5 Identifying Reused Functions in Binary Code
- 6 Function Fingerprinting
- 7 Free Open-Source Software Fingerprinting
- 8 Clone Detection
- 9 Authorship Attribution
- 10 Conclusion.