TY - CHAP
T1 - Conclusion
AU - Alrabaee, Saed
AU - Debbabi, Mourad
AU - Shirani, Paria
AU - Wang, Lingyu
AU - Youssef, Amr
AU - Rahimian, Ashkan
AU - Nouh, Lina
AU - Mouheb, Djedjiga
AU - Huang, He
AU - Hanna, Aiman
N1 - Publisher Copyright:
© 2020, Springer Nature Switzerland AG.
PY - 2020
Y1 - 2020
N2 - The rise of malware attacks in recent years has significantly increased the importance of binary code analysis for extracting intelligence that could be used to propose countermeasures that will attenuate the risks underlying these attacks. This has led to a surge of interest in designing and implementing scalable and efficient binary code fingerprinting techniques that support a multitude of security applications such as vulnerability detection, patch analysis, reverse engineering, digital forensics, malware detection, and authorship attribution.
AB - The rise of malware attacks in recent years has significantly increased the importance of binary code analysis for extracting intelligence that could be used to propose countermeasures that will attenuate the risks underlying these attacks. This has led to a surge of interest in designing and implementing scalable and efficient binary code fingerprinting techniques that support a multitude of security applications such as vulnerability detection, patch analysis, reverse engineering, digital forensics, malware detection, and authorship attribution.
UR - http://www.scopus.com/inward/record.url?scp=85080862945&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85080862945&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-34238-8_10
DO - 10.1007/978-3-030-34238-8_10
M3 - Chapter
AN - SCOPUS:85080862945
T3 - Advances in Information Security
SP - 231
EP - 233
BT - Advances in Information Security
PB - Springer
ER -