Fuzzy Hashing
Blog Posts
Comparing the Performance of Hashing Techniques for Similar Function Detection
This blog post explores the challenges of code comparison and presents a solution to the problem.
Read More• By Edward J. Schwartz
In Reverse Engineering for Malware Analysis
Fuzzy Hashing Against Different Types of Malware
This SEI Blog post explores the use of fuzzy hashing techniques to detect and classify various types of malware, enhancing cybersecurity capabilities.
Read More• By David French
In Reverse Engineering for Malware Analysis
Fuzzy Hashing Techniques in Applied Malware Analysis
This SEI Blog post describes efforts to develop fuzzy hashing, a technique to help analysts determine if two pieces of suspected malware are similar.
Read More