Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Lina Nouh"'
Autor:
Aiman Hanna, Lina Nouh, Mourad Debbabi, Ashkan Rahimian, Djedjiga Mouheb, Amr M. Youssef, He Huang, Lingyu Wang, Saed Alrabaee, Paria Shirani
Publikováno v:
Advances in Information Security ISBN: 9783030342371
When the source code is unavailable, it is important for security applications, such as malware detection, software license infringement, vulnerability analysis, and digital forensics to be able to efficiently extract meaningful fingerprints from the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::375c5652d778a0cc5f4966e57aa77b14
https://doi.org/10.1007/978-3-030-34238-8_2
https://doi.org/10.1007/978-3-030-34238-8_2
Autor:
Lingyu Wang, Amr M. Youssef, Lina Nouh, He Huang, Saed Alrabaee, Paria Shirani, Mourad Debbabi, Djedjiga Mouheb, Aiman Hanna, Ashkan Rahimian
Publikováno v:
Advances in Information Security ISBN: 9783030342371
Discovering reused binary functions is crucial for many security applications, especially considering the fact that many modern malware typically contain a significant amount of functions borrowed from open-source software packages. This process will
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::35a7d84f997b650fde4468e110558d3f
https://doi.org/10.1007/978-3-030-34238-8_5
https://doi.org/10.1007/978-3-030-34238-8_5
Autor:
Lingyu Wang, Saed Alrabaee, Amr M. Youssef, Djedjiga Mouheb, Lina Nouh, Mourad Debbabi, Paria Shirani, Ashkan Rahimian, Aiman Hanna, He Huang
Publikováno v:
Advances in Information Security ISBN: 9783030342371
Advances in Information Security
Advances in Information Security
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5fd934699da3de20bd0c5ac3827fb33e
https://doi.org/10.1007/978-3-030-34238-8
https://doi.org/10.1007/978-3-030-34238-8
Autor:
Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
Publikováno v:
Advances in Information Security ISBN: 9783030342371
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::21728cb43b3a76aa4f51a5bcd9ba540a
https://doi.org/10.1007/978-3-030-34238-8_8
https://doi.org/10.1007/978-3-030-34238-8_8
Autor:
Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
Publikováno v:
Advances in Information Security ISBN: 9783030342371
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d18da862ad3dbc695edb4fe4da600571
https://doi.org/10.1007/978-3-030-34238-8_9
https://doi.org/10.1007/978-3-030-34238-8_9
Autor:
Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
Publikováno v:
Advances in Information Security ISBN: 9783030342371
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::daeebc5734fa453cd9b5def88707b113
https://doi.org/10.1007/978-3-030-34238-8_1
https://doi.org/10.1007/978-3-030-34238-8_1
Autor:
Aiman Hanna, Djedjiga Mouheb, Lina Nouh, He Huang, Ashkan Rahimian, Paria Shirani, Amr M. Youssef, Lingyu Wang, Saed Alrabaee, Mourad Debbabi
Publikováno v:
Advances in Information Security ISBN: 9783030342371
Program binaries typically contain a significant amount of library functions taken from standard libraries or free open-source software packages. Automatically identifying such library functions not only enhances the quality and efficiency of threat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::74f841298833fed95c66a5f208a9c3ce
https://doi.org/10.1007/978-3-030-34238-8_4
https://doi.org/10.1007/978-3-030-34238-8_4
Autor:
Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
Publikováno v:
Advances in Information Security ISBN: 9783030342371
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e0d6e00cf13899c9afff9c9beee0beab
https://doi.org/10.1007/978-3-030-34238-8_6
https://doi.org/10.1007/978-3-030-34238-8_6
Autor:
He Huang, Lingyu Wang, Aiman Hanna, Djedjiga Mouheb, Paria Shirani, Amr M. Youssef, Lina Nouh, Saed Alrabaee, Ashkan Rahimian, Mourad Debbabi
Publikováno v:
Advances in Information Security ISBN: 9783030342371
This chapter presents an approach to fingerprint free open-source software (FOSS) packages. FOSS package identification is crucial for several important security applications, e.g., digital forensics, software license infringement, and malware detect
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::da18c3deebf8a05a3149e8b8a5eed7fb
https://doi.org/10.1007/978-3-030-34238-8_7
https://doi.org/10.1007/978-3-030-34238-8_7
Autor:
Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
Publikováno v:
Advances in Information Security ISBN: 9783030342371
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::afa7881ce06bd3928d7e7adf839cd230
https://doi.org/10.1007/978-3-030-34238-8_10
https://doi.org/10.1007/978-3-030-34238-8_10