Fuzzy Hashing
Blog Posts
Comparing the Performance of Hashing Techniques for Similar Function Detection
This blog post explores the challenges of code comparison and presents a solution to the problem.
• By Edward J. Schwartz
In Reverse Engineering for Malware Analysis
![Edward Schwartz](/media/images/thumb_big_e-schwartz_blog_autho.max-180x180.format-webp.webp)
Fuzzy Hashing Against Different Types of Malware
This SEI Blog post explores the use of fuzzy hashing techniques to detect and classify various types of malware, enhancing cybersecurity capabilities.
• By David French
In Reverse Engineering for Malware Analysis
![David French](/media/images/thumb_big_d-french_blog_authors.max-180x180.format-webp.webp)
Fuzzy Hashing Techniques in Applied Malware Analysis
This SEI Blog post describes efforts to develop fuzzy hashing, a technique to help analysts determine if two pieces of suspected malware are similar.
• By David French
In Reverse Engineering for Malware Analysis
![David French](/media/images/thumb_big_d-french_blog_authors.max-180x180.format-webp.webp)