|
Showing 1 - 6 of
6 matches in All Departments
This book addresses automated software fingerprinting in binary
code, especially for cybersecurity applications. The reader will
gain a thorough understanding of binary code analysis and several
software fingerprinting techniques for cybersecurity applications,
such as malware detection, vulnerability analysis, and digital
forensics. More specifically, it starts with an overview of binary
code analysis and its challenges, and then discusses the existing
state-of-the-art approaches and their cybersecurity applications.
Furthermore, it discusses and details a set of practical techniques
for compiler provenance extraction, library function
identification, function fingerprinting, code reuse detection, free
open-source software identification, vulnerability search, and
authorship attribution. It also illustrates several case studies to
demonstrate the efficiency, scalability and accuracy of the
above-mentioned proposed techniques and tools. This book also
introduces several innovative quantitative and qualitative
techniques that synergistically leverage machine learning, program
analysis, and software engineering methods to solve binary code
fingerprinting problems, which are highly relevant to cybersecurity
and digital forensics applications. The above-mentioned techniques
are cautiously designed to gain satisfactory levels of efficiency
and accuracy. Researchers working in academia, industry and
governmental agencies focusing on Cybersecurity will want to
purchase this book. Software engineers and advanced-level students
studying computer science, computer engineering and software
engineering will also want to purchase this book.
In this study, which highlights a renewed emphasis in international
affairs on regional studies, the co-authors provide an assessment
of the revolutionary changes in the politics and security of the
Middle East and North Africa (MENA).
This book addresses automated software fingerprinting in binary
code, especially for cybersecurity applications. The reader will
gain a thorough understanding of binary code analysis and several
software fingerprinting techniques for cybersecurity applications,
such as malware detection, vulnerability analysis, and digital
forensics. More specifically, it starts with an overview of binary
code analysis and its challenges, and then discusses the existing
state-of-the-art approaches and their cybersecurity applications.
Furthermore, it discusses and details a set of practical techniques
for compiler provenance extraction, library function
identification, function fingerprinting, code reuse detection, free
open-source software identification, vulnerability search, and
authorship attribution. It also illustrates several case studies to
demonstrate the efficiency, scalability and accuracy of the
above-mentioned proposed techniques and tools. This book also
introduces several innovative quantitative and qualitative
techniques that synergistically leverage machine learning, program
analysis, and software engineering methods to solve binary code
fingerprinting problems, which are highly relevant to cybersecurity
and digital forensics applications. The above-mentioned techniques
are cautiously designed to gain satisfactory levels of efficiency
and accuracy. Researchers working in academia, industry and
governmental agencies focusing on Cybersecurity will want to
purchase this book. Software engineers and advanced-level students
studying computer science, computer engineering and software
engineering will also want to purchase this book.
This book constitutes the proceedings of the 21st International
Conference on Selected Areas in Cryptography, SAC 2014, held in
Montreal, QC, Canada, in August 2014. The 22 papers presented in
this volume were carefully reviewed and selected from 103
submissions. There are four areas covered at each SAC conference.
The three permanent areas are: design and analysis of symmetric key
primitives and cryptosystems, including block and stream ciphers,
hash function, MAC algorithms, cryptographic permutations, and
authenticated encryption schemes; efficient implementations of
symmetric and public key algorithms; mathematical and algorithmic
aspects of applied cryptology. This year, the fourth area for SAC
2014 is: algorithms for cryptography, cryptanalysis and their
complexity analysis.
This book constitutes the refereed proceedings of the 6th
International Conference on the Theory and Application of
Cryptographic Techniques in Africa, AFRICACRYPT 2013, held in
Cairo, Egypt, in June 2013. The 26 papers presented were carefully
reviewed and selected from 77 submissions. They cover the following
topics: secret-key and public-key cryptography and cryptanalysis,
efficient implementation, cryptographic protocols, design of
cryptographic schemes, security proofs, foundations and complexity
theory, information theory, multi-party computation, elliptic
curves, and lattices.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R164
Discovery Miles 1 640
|