A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features

S Alrabaee, M Debbabi, L Wang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Binary code fingerprinting is crucial in many security applications. Examples include
malware detection, software infringement, vulnerability analysis, and digital forensics. It is …

Senet-i: An approach for detecting network intrusions through serialized network traffic images

YA Farrukh, S Wali, I Khan, ND Bastian - Engineering Applications of …, 2023 - Elsevier
The exponential growth of the internet and inter-connectivity has resulted in an extensive
increase in network size and the corresponding data, which has led to numerous novel …

Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets

J Gray, D Sgandurra, L Cavallaro… - ACM Computing …, 2024 - dl.acm.org
Attributing a piece of malware to its creator typically requires threat intelligence. Binary
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …

SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification

Q Song, Y Sang, Y Zhang, S Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Binary semantic comparison and authorship verification are critical in many security
applications. They respectively focus on the functional semantic features and developers' …

Image-based approach to intrusion detection in cyber-physical objects

S Golubev, E Novikova, E Fedorchenko - Information, 2022 - mdpi.com
Recently, approaches based on the transformation of tabular data into images have gained
a lot of scientific attention. This is explained by the fact that convolutional neural networks …

Scs-gan: Learning functionality-agnostic stylometric representations for source code authorship verification

W Ou, SHH Ding, Y Tian, L Song - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In recent years, the number of anonymous script-based fileless malware attacks and
software copyright disputes has increased rapidly. In the literature, automated Code …

BinMLM: Binary authorship verification with flow-aware mixture-of-shared language model

Q Song, Y Zhang, L Ouyang… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Binary authorship analysis is a significant problem in many software engineering
applications. In this paper, we formulate a binary authorship verification task to accurately …

Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning

EMB Karbab, M Debbabi, A Derhab, D Mouheb - computers & security, 2020 - Elsevier
The daily amount of Android malicious applications (apps) targeting the app repositories is
increasing, and their number is overwhelming the process of fingerprinting. To address this …

Identifying authorship style in malicious binaries: techniques, challenges & datasets

J Gray, D Sgandurra, L Cavallaro - arxiv preprint arxiv:2101.06124, 2021 - arxiv.org
Attributing a piece of malware to its creator typically requires threat intelligence. Binary
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …

[BUCH][B] Android malware detection using machine learning: data-driven fingerprinting and threat intelligence

EMB Karbab, M Debbabi, A Derhab, D Mouheb - 2021 - Springer
The authors develop a malware fingerprinting framework to cover accurate android malware
detection and family attribution in this book. The authors emphasize the following:(1) the …