search
menu
icon-carat-right
cmu-wordmark
✕
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
Enterprise Risk and Resilience Management
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity and Inclusion
Internship Opportunities
Working at the SEI
Carnegie Mellon University
Software Engineering Institute
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cloud Computing
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity, and Inclusion
Internship Opportunities
Home
Publications
Authors
Edward J. Schwartz
Edward Schwartz
Software Engineering Institute
All
Tech Publications
Blog Posts
Videos
The Great Fuzzy Hashing Debate
April 22, 2024
•
Blog Post
By
Edward J. Schwartz
Comparing the Performance of Hashing Techniques for Similar Function Detection
April 15, 2024
•
Blog Post
By
Edward J. Schwartz
Advancing Cyber Operator Tradecraft Through Automated Static Binary Analysis
December 15, 2020
•
Video
By
Cory Cohen
,
Edward J. Schwartz
,
Jeff Gennari
Advancing Cyber Operator Tradecraft Through Automated Static Binary Analysis
November 3, 2020
•
Presentation
By
Edward J. Schwartz
,
Cory Cohen
Poster - Recovering Meaningful Variable Names in Decompiled Code
November 3, 2020
•
Poster
By
Edward J. Schwartz
,
Cory Cohen
More from Edward Schwartz
Poster - Recovering Meaningful Variable Names in Decompiled Code
November 3, 2020
•
Poster
By
Edward J. Schwartz
,
Cory Cohen
Poster - Program Reachability for Vulnerability and Malware Analysis
November 3, 2020
•
Poster
By
Edward J. Schwartz
Poster - Improvements to Object Oriented Construct Recovery Using OOAnalyzer
November 3, 2020
•
Poster
By
Cory Cohen
,
Edward J. Schwartz
Vulnerability Discovery Poster (SEI 2015 Research Review)
October 22, 2015
•
Poster
By
Edward J. Schwartz
More from Edward Schwartz
The Great Fuzzy Hashing Debate
April 22, 2024
•
Blog Post
By
Edward J. Schwartz
Comparing the Performance of Hashing Techniques for Similar Function Detection
April 15, 2024
•
Blog Post
By
Edward J. Schwartz
Early Software Vulnerability Detection with Technical Debt
August 8, 2016
•
Blog Post
By
Robert Nord
,
Edward J. Schwartz
More from Edward Schwartz
Advancing Cyber Operator Tradecraft Through Automated Static Binary Analysis
December 15, 2020
•
Video
By
Cory Cohen
,
Edward J. Schwartz
,
Jeff Gennari
More from Edward Schwartz
Send a Message