2017
DOI: 10.1007/978-3-319-66399-9_16
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Multiple Authors in a Binary Program

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
37
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(38 citation statements)
references
References 22 publications
1
37
0
Order By: Relevance
“…Two approaches are considered to identify a programmer of software based on the available code form, which are source code and executable binaries. Several techniques for identifying programmers when only executable machine code is available [18,39,48]. On the other hand, most of the works on code authorship identification are conducted on source code [14,16,17,24,25,29,[35][36][37]45].…”
Section: Single-author Code Identificationmentioning
confidence: 99%
See 3 more Smart Citations
“…Two approaches are considered to identify a programmer of software based on the available code form, which are source code and executable binaries. Several techniques for identifying programmers when only executable machine code is available [18,39,48]. On the other hand, most of the works on code authorship identification are conducted on source code [14,16,17,24,25,29,[35][36][37]45].…”
Section: Single-author Code Identificationmentioning
confidence: 99%
“…However, most of those approaches are inapplicable to authorship identification on structured code due to the inflexibility of the written code expressions established by the syntax rules. Recently, several efforts have investigated authorship identification of structured code, such as computer programs [1,16,17,39]. These efforts established that programmers have distinctive and identifying programming styles that can survive compilation [18,39].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…According to existing research [28], [21], [4], they can identify hundreds of authors with high accuracy from program binaries. Although those results are scientifically impressive, this approach faces a big problem if they are applied in some real forensics scenario such as malware analysis.…”
Section: Introductionmentioning
confidence: 99%