Identifying authorship in malicious binaries: Features, challenges & datasets

J Gray, D Sgandurra, L Cavallaro… - ACM Computing …, 2024 - dl.acm.org
Attributing a piece of malware to its creator typically requires threat intelligence. Binary
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …

Authorship attribution methods, challenges, and future research directions: A comprehensive survey

X He, AH Lashkari, N Vombatkere, DP Sharma - Information, 2024 - mdpi.com
Over the past few decades, researchers have put their effort and paid significant attention to
the authorship attribution field, as it plays an important role in software forensics analysis …

Authorship identification using ensemble learning

A Abbasi, AR Javed, F Iqbal, Z Jalil, TR Gadekallu… - Scientific reports, 2022 - nature.com
With time, textual data is proliferating, primarily through the publications of articles. With this
rapid increase in textual data, anonymous content is also increasing. Researchers are …

Misleading authorship attribution of source code using adversarial learning

E Quiring, A Maier, K Rieck - 28th USENIX Security Symposium …, 2019 - usenix.org
In this paper, we present a novel attack against authorship attribution of source code. We
exploit that recent attribution methods rest on machine learning and thus can be deceived by …

Large-scale and language-oblivious code authorship identification

M Abuhamad, T AbuHmed, A Mohaisen… - Proceedings of the 2018 …, 2018 - dl.acm.org
Efficient extraction of code authorship attributes is key for successful identification. However,
the extraction of such attributes is very challenging, due to various programming language …

Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned

D Kim, E Kim, SK Cha, S Son… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Binary code similarity analysis (BCSA) is widely used for diverse security applications,
including plagiarism detection, software license violation detection, and vulnerability …

Machine learning-based analysis of program binaries: A comprehensive study

H Xue, S Sun, G Venkataramani, T Lan - IEEE Access, 2019 - ieeexplore.ieee.org
Binary code analysis is crucial in various software engineering tasks, such as malware
detection, code refactoring, and plagiarism detection. With the rapid growth of software …

A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features

S Alrabaee, M Debbabi, L Wang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Binary code fingerprinting is crucial in many security applications. Examples include
malware detection, software infringement, vulnerability analysis, and digital forensics. It is …

Ransomware detection and classification strategies

A Vehabovic, N Ghani, E Bou-Harb… - … Sea Conference on …, 2022 - ieeexplore.ieee.org
Ransomware uses encryption methods to make data inaccessible to legitimate users. To
date a wide range of ransomware families have been developed and deployed, causing …

Code authorship identification using convolutional neural networks

M Abuhamad, J Rhim, T AbuHmed, S Ullah… - Future Generation …, 2019 - Elsevier
Although source code authorship identification creates a privacy threat for many open
source contributors, it is an important topic for the forensics field and enables many …