search menu icon-carat-right cmu-wordmark

Subject: Fuzzy Hashing

Fuzzy Hashing Against Different Types of Malware

Fuzzy Hashing Against Different Types of Malware

• SEI Blog
David French

Malware, which is short for "malicious software," is a growing problem for government and commercial organizations since it disrupts or denies important operations, gathers private information without consent, gains unauthorized access to system resources, and other inappropriate behaviors. A previous blog postdescribed the use of "fuzzy hashing" to determine whether two files suspected of being malware are similar, which helps analysts potentially save time by identifying opportunities to leverage previous analysis of malware when confronted...

Read More
Fuzzy Hashing Techniques in Applied Malware Analysis

Fuzzy Hashing Techniques in Applied Malware Analysis

• SEI Blog
David French

Malware--generically defined as software designed to access a computer system without the owner's informed consent--is a growing problem for government and commercial organizations. In recent years, research into malware focused on similarity metrics to decide whether two suspected malicious files are similar to one another. Analysts use these metrics to determine whether a suspected malicious file bears any resemblance to already verified malicious files. Using these metrics allows analysts to potentially save time, by identifying...

Read More