A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features
Binary code fingerprinting is crucial in many security applications. Examples include
malware detection, software infringement, vulnerability analysis, and digital forensics. It is …
malware detection, software infringement, vulnerability analysis, and digital forensics. It is …
Senet-i: An approach for detecting network intrusions through serialized network traffic images
The exponential growth of the internet and inter-connectivity has resulted in an extensive
increase in network size and the corresponding data, which has led to numerous novel …
increase in network size and the corresponding data, which has led to numerous novel …
Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets
Attributing a piece of malware to its creator typically requires threat intelligence. Binary
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification
Q Song, Y Sang, Y Zhang, S Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Binary semantic comparison and authorship verification are critical in many security
applications. They respectively focus on the functional semantic features and developers' …
applications. They respectively focus on the functional semantic features and developers' …
Image-based approach to intrusion detection in cyber-physical objects
Recently, approaches based on the transformation of tabular data into images have gained
a lot of scientific attention. This is explained by the fact that convolutional neural networks …
a lot of scientific attention. This is explained by the fact that convolutional neural networks …
Scs-gan: Learning functionality-agnostic stylometric representations for source code authorship verification
In recent years, the number of anonymous script-based fileless malware attacks and
software copyright disputes has increased rapidly. In the literature, automated Code …
software copyright disputes has increased rapidly. In the literature, automated Code …
BinMLM: Binary authorship verification with flow-aware mixture-of-shared language model
Q Song, Y Zhang, L Ouyang… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Binary authorship analysis is a significant problem in many software engineering
applications. In this paper, we formulate a binary authorship verification task to accurately …
applications. In this paper, we formulate a binary authorship verification task to accurately …
Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning
The daily amount of Android malicious applications (apps) targeting the app repositories is
increasing, and their number is overwhelming the process of fingerprinting. To address this …
increasing, and their number is overwhelming the process of fingerprinting. To address this …
Identifying authorship style in malicious binaries: techniques, challenges & datasets
Attributing a piece of malware to its creator typically requires threat intelligence. Binary
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …
[BUCH][B] Android malware detection using machine learning: data-driven fingerprinting and threat intelligence
The authors develop a malware fingerprinting framework to cover accurate android malware
detection and family attribution in this book. The authors emphasize the following:(1) the …
detection and family attribution in this book. The authors emphasize the following:(1) the …