You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse det...
This book constitutes the refereed proceedings of the Third International Conference on Soft Computing and its Engineering Applications, icSoftComp 2021, held in Changa, India, in December 2021. Due to the COVID-19 pandemic the conference was held online. The 29 full papers and 4 short papers presented were carefully reviewed and selected from 247 submissions. The papers present recent research on theory and applications in fuzzy computing, neuro computing, and evolutionary computing.
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The work is organized as follows: chapter 1 presents an introduction to software security, model-driven en...
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity netw...
This journal subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, empirical investigations, state-of-the-art methods, and tools in all different genres of edutainment, such as game-based learning and serious games, interactive storytelling, virtual learning environments, VR-based education, and related fields. It covers aspects from educational and game theories, human-computer interaction, computer graphics, artificial intelligence, and systems design. The 19 papers presented in the 15th issue were organized in the following topical sections: multimedia; simulation; cybersecurity; and e-learning.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Foundations and Practice of Security, FPS 2015, held in Clermont-Ferrand, France, in October 2015. The 12 revised full papers presented together with 8 short papers and 2 keynote talks were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on RFID, sensors and secure computation; security policies and biometrics; evaluation of protocols and obfuscation security; spam emails, botnets and malware.
Software is the essential enabling means for science and the new economy. It helps us to create a more reliable, flexible and robust society. But software often falls short of our expectations. Current methodologies, tools, and techniques remain expensive and are not yet sufficiently reliable, while many promising approaches have proved to be no more than case-by-case oriented methods. This book contains extensively reviewed papers from the eleventh International Conference on New Trends in software Methodology, Tools and Techniques (SoMeT_12), held in Genoa, Italy, in September 2012. The conference provides an opportunity for scholars from the international research community to discuss and...
This interdisciplinary Handbook provides an in-depth analysis of the complex security phenomenon of disinformation and offers a toolkit to counter such tactics. Disinformation used to propagate false, inexact or out of context information is today a frequently used tool of political manipulation and information warfare, both online and offline. This Handbook evidences a historical thread of continuing practices and modus operandi in overt state propaganda and covert information operations. Further, it attempts to unveil current methods used by propaganda actors, the inherent vulnerabilities they exploit in the fabric of democratic societies and, last but not least, to highlight current pract...
This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12–14, 2022. The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.