|
Showing 1 - 2 of
2 matches in All Departments
This book addresses automated software fingerprinting in binary
code, especially for cybersecurity applications. The reader will
gain a thorough understanding of binary code analysis and several
software fingerprinting techniques for cybersecurity applications,
such as malware detection, vulnerability analysis, and digital
forensics. More specifically, it starts with an overview of binary
code analysis and its challenges, and then discusses the existing
state-of-the-art approaches and their cybersecurity applications.
Furthermore, it discusses and details a set of practical techniques
for compiler provenance extraction, library function
identification, function fingerprinting, code reuse detection, free
open-source software identification, vulnerability search, and
authorship attribution. It also illustrates several case studies to
demonstrate the efficiency, scalability and accuracy of the
above-mentioned proposed techniques and tools. This book also
introduces several innovative quantitative and qualitative
techniques that synergistically leverage machine learning, program
analysis, and software engineering methods to solve binary code
fingerprinting problems, which are highly relevant to cybersecurity
and digital forensics applications. The above-mentioned techniques
are cautiously designed to gain satisfactory levels of efficiency
and accuracy. Researchers working in academia, industry and
governmental agencies focusing on Cybersecurity will want to
purchase this book. Software engineers and advanced-level students
studying computer science, computer engineering and software
engineering will also want to purchase this book.
This book addresses automated software fingerprinting in binary
code, especially for cybersecurity applications. The reader will
gain a thorough understanding of binary code analysis and several
software fingerprinting techniques for cybersecurity applications,
such as malware detection, vulnerability analysis, and digital
forensics. More specifically, it starts with an overview of binary
code analysis and its challenges, and then discusses the existing
state-of-the-art approaches and their cybersecurity applications.
Furthermore, it discusses and details a set of practical techniques
for compiler provenance extraction, library function
identification, function fingerprinting, code reuse detection, free
open-source software identification, vulnerability search, and
authorship attribution. It also illustrates several case studies to
demonstrate the efficiency, scalability and accuracy of the
above-mentioned proposed techniques and tools. This book also
introduces several innovative quantitative and qualitative
techniques that synergistically leverage machine learning, program
analysis, and software engineering methods to solve binary code
fingerprinting problems, which are highly relevant to cybersecurity
and digital forensics applications. The above-mentioned techniques
are cautiously designed to gain satisfactory levels of efficiency
and accuracy. Researchers working in academia, industry and
governmental agencies focusing on Cybersecurity will want to
purchase this book. Software engineers and advanced-level students
studying computer science, computer engineering and software
engineering will also want to purchase this book.
|
You may like...
The Car
Arctic Monkeys
CD
R383
Discovery Miles 3 830
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|