Abstract
The rise of malware attacks in recent years has significantly increased the importance of binary code analysis for extracting intelligence that could be used to propose countermeasures that will attenuate the risks underlying these attacks. This has led to a surge of interest in designing and implementing scalable and efficient binary code fingerprinting techniques that support a multitude of security applications such as vulnerability detection, patch analysis, reverse engineering, digital forensics, malware detection, and authorship attribution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Alrabaee, S. et al. (2020). Conclusion. In: Binary Code Fingerprinting for Cybersecurity. Advances in Information Security, vol 78. Springer, Cham. https://doi.org/10.1007/978-3-030-34238-8_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-34238-8_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34237-1
Online ISBN: 978-3-030-34238-8
eBook Packages: Computer ScienceComputer Science (R0)