Binary Code Fingerprinting for Cybersecurity Application to Malicious Code Fingerprinting /

This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerabili...

Full description

Main Authors: Alrabaee, Saed. (Author, http://id.loc.gov/vocabulary/relators/aut), Debbabi, Mourad. (http://id.loc.gov/vocabulary/relators/aut), Shirani, Paria. (http://id.loc.gov/vocabulary/relators/aut), Wang, Lingyu. (http://id.loc.gov/vocabulary/relators/aut), Youssef, Amr. (http://id.loc.gov/vocabulary/relators/aut), Rahimian, Ashkan. (http://id.loc.gov/vocabulary/relators/aut), Nouh, Lina. (http://id.loc.gov/vocabulary/relators/aut), Mouheb, Djedjiga. (http://id.loc.gov/vocabulary/relators/aut), Huang, He. (http://id.loc.gov/vocabulary/relators/aut), Hanna, Aiman. (http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2020.
Edition:1st ed. 2020.
Series:Advances in Information Security, 78
Subjects:
Online Access:https://doi.org/10.1007/978-3-030-34238-8
Table of Contents:
  • 1 Introduction
  • 2 Binary Analysis Overview
  • 3 Compiler Provenance Attribution
  • 4 Library Function Identification
  • 5 Identifying Reused Functions in Binary Code
  • 6 Function Fingerprinting
  • 7 Free Open-Source Software Fingerprinting
  • 8 Clone Detection
  • 9 Authorship Attribution
  • 10 Conclusion.