語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Binary Code Fingerprinting for Cyber...
~
Youssef, Amr.
Binary Code Fingerprinting for Cybersecurity = Application to Malicious Code Fingerprinting /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Binary Code Fingerprinting for Cybersecurity/ by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna.
其他題名:
Application to Malicious Code Fingerprinting /
作者:
Alrabaee, Saed.
其他作者:
Hanna, Aiman.
面頁冊數:
XXI, 249 p. 78 illus., 32 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Cybercrime. -
電子資源:
https://doi.org/10.1007/978-3-030-34238-8
ISBN:
9783030342388
Binary Code Fingerprinting for Cybersecurity = Application to Malicious Code Fingerprinting /
Alrabaee, Saed.
Binary Code Fingerprinting for Cybersecurity
Application to Malicious Code Fingerprinting /[electronic resource] :by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna. - 1st ed. 2020. - XXI, 249 p. 78 illus., 32 illus. in color.online resource. - Advances in Information Security,781568-2633 ;. - Advances in Information Security,.
1 Introduction -- 2 Binary Analysis Overview -- 3 Compiler Provenance Attribution -- 4 Library Function Identification -- 5 Identifying Reused Functions in Binary Code -- 6 Function Fingerprinting -- 7 Free Open-Source Software Fingerprinting -- 8 Clone Detection -- 9 Authorship Attribution -- 10 Conclusion.
This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse detection, free open-source software identification, vulnerability search, and authorship attribution. It also illustrates several case studies to demonstrate the efficiency, scalability and accuracy of the above-mentioned proposed techniques and tools. This book also introduces several innovative quantitative and qualitative techniques that synergistically leverage machine learning, program analysis, and software engineering methods to solve binary code fingerprinting problems, which are highly relevant to cybersecurity and digital forensics applications. The above-mentioned techniques are cautiously designed to gain satisfactory levels of efficiency and accuracy. Researchers working in academia, industry and governmental agencies focusing on Cybersecurity will want to purchase this book. Software engineers and advanced-level students studying computer science, computer engineering and software engineering will also want to purchase this book.
ISBN: 9783030342388
Standard No.: 10.1007/978-3-030-34238-8doiSubjects--Topical Terms:
1109747
Cybercrime.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Binary Code Fingerprinting for Cybersecurity = Application to Malicious Code Fingerprinting /
LDR
:03534nam a22004095i 4500
001
1026961
003
DE-He213
005
20200630005329.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030342388
$9
978-3-030-34238-8
024
7
$a
10.1007/978-3-030-34238-8
$2
doi
035
$a
978-3-030-34238-8
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Alrabaee, Saed.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1323316
245
1 0
$a
Binary Code Fingerprinting for Cybersecurity
$h
[electronic resource] :
$b
Application to Malicious Code Fingerprinting /
$c
by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XXI, 249 p. 78 illus., 32 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advances in Information Security,
$x
1568-2633 ;
$v
78
505
0
$a
1 Introduction -- 2 Binary Analysis Overview -- 3 Compiler Provenance Attribution -- 4 Library Function Identification -- 5 Identifying Reused Functions in Binary Code -- 6 Function Fingerprinting -- 7 Free Open-Source Software Fingerprinting -- 8 Clone Detection -- 9 Authorship Attribution -- 10 Conclusion.
520
$a
This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse detection, free open-source software identification, vulnerability search, and authorship attribution. It also illustrates several case studies to demonstrate the efficiency, scalability and accuracy of the above-mentioned proposed techniques and tools. This book also introduces several innovative quantitative and qualitative techniques that synergistically leverage machine learning, program analysis, and software engineering methods to solve binary code fingerprinting problems, which are highly relevant to cybersecurity and digital forensics applications. The above-mentioned techniques are cautiously designed to gain satisfactory levels of efficiency and accuracy. Researchers working in academia, industry and governmental agencies focusing on Cybersecurity will want to purchase this book. Software engineers and advanced-level students studying computer science, computer engineering and software engineering will also want to purchase this book.
650
2 4
$a
Cybercrime.
$3
1109747
650
2 4
$a
Biometrics.
$3
677095
650
1 4
$a
Security.
$3
1114130
650
0
$a
Computer crimes.
$3
564161
650
0
$a
Biometrics (Biology).
$3
1249740
650
0
$a
Data protection.
$3
557764
700
1
$a
Hanna, Aiman.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1323321
700
1
$a
Huang, He.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1323320
700
1
$a
Mouheb, Djedjiga.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1258106
700
1
$a
Nouh, Lina.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1323319
700
1
$a
Rahimian, Ashkan.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1323318
700
1
$a
Youssef, Amr.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1076431
700
1
$a
Wang, Lingyu.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1024773
700
1
$a
Shirani, Paria.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1323317
700
1
$a
Debbabi, Mourad.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1258107
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030342371
776
0 8
$i
Printed edition:
$z
9783030342395
776
0 8
$i
Printed edition:
$z
9783030342401
830
0
$a
Advances in Information Security,
$x
1568-2633
$3
1256774
856
4 0
$u
https://doi.org/10.1007/978-3-030-34238-8
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入