Home > Computer & Internet > Computer security > Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting
37%
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting

Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting

          
5
4
3
2
1

Available


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book


About the Author: Saed Alrabaee is an Assistant Professor at the Department of Information Systems and Security in United Arab Emirates University (UAEU). Prior to joining UAEU, Dr. Alrabaee was a Visiting Assistant Professor at the Department of Electrical and Computer Engineering and Computer Science at the University of New Haven (UNH), US. Dr. Alrabaee holds a Ph.D. degree in information system engineering from Concordia University in Montreal, Canada, which was executed under the supervision of Prof. Mourad Debbabi and Prof. Lingyu Wang. His research interests focus on the broad area of cybersecurity, reverse engineering, including, binary authorship attribution and characterization, malware analysis, and function fingerprinting.
Mourad Debbabi is a Full Professor at the Concordia Institute for Information Systems Engineering (CIISE) and Associate Dean Research and Graduate Studies at the Gina Cody School of Engineering and Computer Science. He holds the NSERC/Hydro-Québec Thales Senior Industrial Research Chair in Smart Grid Security and the Concordia Research Chair Tier I in Information Systems Security. He is also the President of the National Cyber Forensics and Training Alliance (NCFTA) Canada, and a member of CATAAlliance's Cybercrime Advisory Council. He is the founder and one of the leaders of the Security Research Centre at Concordia University. Dr. Debbabi holds Ph.D. and M.Sc. degrees in computer science from Paris-XI Orsay, University, France. He published 3 books and more than 260 peer-reviewed research articles in international journals and conferences on cybersecurity, cyber forensics, privacy, cryptographic protocols, threat intelligence generation, malware analysis, smart grid security, reverse engineering, specification and verification of safety-critical systems, programming languages and type theory. He supervised to successful completion of 30 Ph.D. students and more than 70 Master students.
Paria Shirani is a PhD candidate at the Concordia Institute for Information Systems Engineering (CIISE) at Concordia University under the supervision of Dr. Mourad Debbabi and Dr. Lingyu Wang. Paria received the National Science and Engineering Research Council (NSERC) Postdoctoral Fellowships, the most prominent postdoctoral award. During her PhD, she was awarded with Fonds de recherche du Québec - Nature et technologies (FRQNT) Scholarship. Paria is currently a member at the Security Research Center at Concordia University, and has been actively working on different topics of cybersecurity, such as software fingerprinting for automated malicious code analysis and smart grid security. Her research interests are in the fields of malware analysis, IoT security, vulnerability detection, network security, and big data analysis.
Lingyu Wang is a Professor at the Concordia Institute for Information Systems Engineering (CIISE) at Concordia University, Montreal, Canada. He received his Ph.D. degree in Information Technology in 2006 from George Mason University. His research interests include cloud computing security, SDN/NFV security, security metrics, software security, and privacy. He has co-authored five books, two patents, and over 120 refereed conference and journal articles at reputable venues including TOPS, TIFS, TDSC, TMC, JCS, S&P, CCS, NDSS, ESORICS, PETS, ICDT, etc.
Amr Youssef is a professor at the Concordia Institute for Information Systems Engineering (CIISE). He received his B.Sc. and M.Sc. degrees from the Department of Electronics and Communications Engineering, Cairo University, Egypt, in 1990 and 1993, respectively, and the Ph.D. degree from the Electrical and Computer Engineering Department, Queens University, Canada, in 1997. Before joining Concordia in 2004, Dr. Youssef worked for Nortel Networks, the Center for Applied Cryptographic Research at the University of Waterloo, IBM, and Cairo University. His main research interests are in the area of cryptology and network security. Dr. Youssef has co-edited 4 books and co/authored about 200 referred papers. Dr. Youssef has served on the Technical Program Committee of more than 60 international conferences and co-chaired the workshop on Selected Areas in Cryptography (SAC) twice. Dr. Youssef is a registered professional engineer (P.Eng.) in Ontario and an IEEE senior member.
Ashkan Rahimian is a Senior Lead in security analytics at Omnia AI, Deloitte Canada's AI practice. He has 10+ years of experience leading productionalized security research and development. He leads the Cyber AI product portfolio and works as a cybersecurity and machine learning specialist. Ashkan's focus is on the design and development of intelligence-driven security models for predictive analytics, UEBA, and proactive threat hunting. Mr. Rahimian holds two Master's degrees in Information Systems Security and Artificial Intelligence and Robotics. He conducted his research under the supervision of Prof. Mourad Debbabi at Concordia University, Montreal, Canada.
Lina Nouh is a Business Analyst at Deloitte Digital Middle East, Riyadh, Saudi Arabia. She received her MAsc in Information Systems Security in 2017 from Concordia University, Montreal, Canada under the supervision of Prof. Mourad Debbabi and Dr. Aiman Hanna. Lina also received her Bachelor of Science in Software Engineering in 2014 from Concordia University, Montreal, Canada. Lina has been always an outstanding student, which has been recognized by receiving the prestigious Dean's list award during all her Bachelor's studies.
Djedjiga Mouheb is an Assistant Professor at the Department of Computer Science, College of Sciences at University of Sharjah, UAE. Dr. Mouheb holds a Ph.D. degree in information system engineering from Concordia University in Montreal, Canada, which was executed under the supervision of Prof. Mourad Debbabi and Prof. Lingyu Wang. Her research interests focus on cybersecurity, including social networking security, malware analysis, software fingerprinting, cyber-threat intelligence, secure software and systems engineering.
He Huang is currently a software engineer at the Moody's Analytics Canada. He received his MAsc in Information Systems Security from Concordia University, Montreal, Canada under the supervision of Prof. Mourad Debbabi and Prof. Amr Youssef, and his Bachelor of Science in Information Security from Huazhong University of Science and Technology.
Aiman Hanna is a Professor at the Department of Computer Science and Software Engineering at the Gina Cody School of Engineering and Computer Science, Concordia University, Montreal, Canada, where he has been teaching for nearly 30 years. He has been the recipient of multiple Excellence and Outstanding Contribution Awards, as well as the OCTAS'2009 Award, Fédération de l'Informatique du Québec (FIQ), 2009. He has additionally been nominated for the Prix du Ministre de l'Éducation de Quebec in 2016. Dr. Hanna is a registered Professional Engineer, and a member of Professional Engineers Ontario (PEO), Canada. He has many years of industrial experience working for some of the largest Canadian firms including Bell Canada/Bell Sygma & CGI. Dr. Hanna holds Ph.D. and M.Sc. degrees in Computer Science from Concordia University, Montreal, Canada. His research focus is on the areas of software security, cybersecurity, software fingerprinting, big-data and container's security, video conferencing, and networking and data communications.


Best Sellers



Product Details
  • ISBN-13: 9783030342371
  • Publisher: Springer International Publishing
  • Publisher Imprint: Springer
  • Height: 234 mm
  • No of Pages: 249
  • Series Title: Advances in Information Security
  • Sub Title: Application to Malicious Code Fingerprinting
  • Width: 156 mm
  • ISBN-10: 3030342379
  • Publisher Date: 01 Mar 2020
  • Binding: Hardback
  • Language: English
  • Returnable: Y
  • Spine Width: 16 mm
  • Weight: 558 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting
Springer International Publishing -
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals



    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!