Fuzzy Hashing
Blog Posts
Fuzzy Hashing Against Different Types of Malware
This SEI Blog post explores the use of fuzzy hashing techniques to detect and classify various types of malware, enhancing cybersecurity capabilities.
• By David French
In Reverse Engineering for Malware Analysis
Fuzzy Hashing Techniques in Applied Malware Analysis
Malware--generically defined as software designed to access a computer system without the owner's informed consent--is a growing problem for government and commercial organizations. In recent years, research into malware focused …