Conclusion

Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

The rise of malware attacks in recent years has significantly increased the importance of binary code analysis for extracting intelligence that could be used to propose countermeasures that will attenuate the risks underlying these attacks. This has led to a surge of interest in designing and implementing scalable and efficient binary code fingerprinting techniques that support a multitude of security applications such as vulnerability detection, patch analysis, reverse engineering, digital forensics, malware detection, and authorship attribution.

Original languageEnglish
Title of host publicationAdvances in Information Security
PublisherSpringer
Pages231-233
Number of pages3
DOIs
Publication statusPublished - 2020

Publication series

NameAdvances in Information Security
Volume78
ISSN (Print)1568-2633

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Conclusion'. Together they form a unique fingerprint.

Cite this