Binary Code Fingerprinting for Cybersecurity Binary Code Fingerprinting for Cybersecurity
Advances in Information Security

Binary Code Fingerprinting for Cybersecurity

Application to Malicious Code Fingerprinting

Saed Alrabaee and Others
    • $194.99
    • $194.99

Publisher Description

This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse detection, free open-source software identification, vulnerability search, and authorship attribution. It also illustrates several case studies to demonstrate the efficiency, scalability and accuracy of the above-mentioned proposed techniques and tools. 
This book also introduces several innovative quantitative and qualitative techniques that synergistically leverage machine learning, program analysis, and software engineering methods to solve binary code fingerprinting problems, which are highly relevant to cybersecurity and digital forensics applications. The above-mentioned techniques are cautiously designed to gain satisfactory levels of efficiency and accuracy. 
Researchers working in academia, industry and governmental agencies focusing on Cybersecurity will want to purchase this book. Software engineers and advanced-level students studying computer science, computer engineering and software engineering will also want to purchase this book.

GENRE
Computing & Internet
RELEASED
2020
29 February
LANGUAGE
EN
English
LENGTH
270
Pages
PUBLISHER
Springer International Publishing
SELLER
Springer Nature B.V.
SIZE
17.3
MB
Cyber Security and Computer Science Cyber Security and Computer Science
2020
Tools and Methods of Program Analysis Tools and Methods of Program Analysis
2017
Reuse and Software Quality Reuse and Software Quality
2022
Foundations and Practice of Security Foundations and Practice of Security
2016
Information, Communication and Computing Technology Information, Communication and Computing Technology
2017
Information and Communications Security Information and Communications Security
2022
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Social Networks and Big Data Security and Privacy in Social Networks and Big Data
2025
Network and System Security Network and System Security
2025
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Evolution of Cyber Technologies and Operations to 2035 Evolution of Cyber Technologies and Operations to 2035
2015
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
2025
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
2024
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024