|
Showing 1 - 3 of
3 matches in All Departments
This book addresses automated software fingerprinting in binary
code, especially for cybersecurity applications. The reader will
gain a thorough understanding of binary code analysis and several
software fingerprinting techniques for cybersecurity applications,
such as malware detection, vulnerability analysis, and digital
forensics. More specifically, it starts with an overview of binary
code analysis and its challenges, and then discusses the existing
state-of-the-art approaches and their cybersecurity applications.
Furthermore, it discusses and details a set of practical techniques
for compiler provenance extraction, library function
identification, function fingerprinting, code reuse detection, free
open-source software identification, vulnerability search, and
authorship attribution. It also illustrates several case studies to
demonstrate the efficiency, scalability and accuracy of the
above-mentioned proposed techniques and tools. This book also
introduces several innovative quantitative and qualitative
techniques that synergistically leverage machine learning, program
analysis, and software engineering methods to solve binary code
fingerprinting problems, which are highly relevant to cybersecurity
and digital forensics applications. The above-mentioned techniques
are cautiously designed to gain satisfactory levels of efficiency
and accuracy. Researchers working in academia, industry and
governmental agencies focusing on Cybersecurity will want to
purchase this book. Software engineers and advanced-level students
studying computer science, computer engineering and software
engineering will also want to purchase this book.
This book addresses automated software fingerprinting in binary
code, especially for cybersecurity applications. The reader will
gain a thorough understanding of binary code analysis and several
software fingerprinting techniques for cybersecurity applications,
such as malware detection, vulnerability analysis, and digital
forensics. More specifically, it starts with an overview of binary
code analysis and its challenges, and then discusses the existing
state-of-the-art approaches and their cybersecurity applications.
Furthermore, it discusses and details a set of practical techniques
for compiler provenance extraction, library function
identification, function fingerprinting, code reuse detection, free
open-source software identification, vulnerability search, and
authorship attribution. It also illustrates several case studies to
demonstrate the efficiency, scalability and accuracy of the
above-mentioned proposed techniques and tools. This book also
introduces several innovative quantitative and qualitative
techniques that synergistically leverage machine learning, program
analysis, and software engineering methods to solve binary code
fingerprinting problems, which are highly relevant to cybersecurity
and digital forensics applications. The above-mentioned techniques
are cautiously designed to gain satisfactory levels of efficiency
and accuracy. Researchers working in academia, industry and
governmental agencies focusing on Cybersecurity will want to
purchase this book. Software engineers and advanced-level students
studying computer science, computer engineering and software
engineering will also want to purchase this book.
Digital forensics deals with the investigation of cybercrimes. With
the growing deployment of cloud computing, mobile computing, and
digital banking on the internet, the nature of digital forensics
has evolved in recent years, and will continue to do so in the near
future.This book presents state-of-the-art techniques to address
imminent challenges in digital forensics. In particular, it focuses
on cloud forensics, Internet-of-Things (IoT) forensics, and network
forensics, elaborating on innovative techniques, including
algorithms, implementation details and performance analysis, to
demonstrate their practicality and efficacy. The innovations
presented in this volume are designed to help various stakeholders
with the state-of-the-art digital forensics techniques to
understand the real world problems. Lastly, the book will answer
the following questions: How do the innovations in digital
forensics evolve with the emerging technologies? What are the
newest challenges in the field of digital forensics?
|
You may like...
Integration
Paul J Morrison
Hardcover
R969
Discovery Miles 9 690
|