<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Fuzzy Hashing</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Fuzzy Hashing</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/fuzzy-hashing/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 15 Apr 2024 00:00:00 -0400</lastBuildDate><item><title>Comparing the Performance of Hashing Techniques for Similar Function Detection</title><link>https://www.sei.cmu.edu/blog/comparing-the-performance-of-hashing-techniques-for-similar-function-detection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post explores the challenges of code comparison and presents a solution to the problem.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Edward Schwartz</dc:creator><pubDate>Mon, 15 Apr 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/comparing-the-performance-of-hashing-techniques-for-similar-function-detection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Fuzzy Hashing</category></item><item><title>Fuzzy Hashing Against Different Types of Malware</title><link>https://www.sei.cmu.edu/blog/fuzzy-hashing-against-different-types-of-malware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores the use of fuzzy hashing techniques to detect and classify various types of malware, enhancing cybersecurity capabilities.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David French</dc:creator><pubDate>Mon, 24 Oct 2011 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/fuzzy-hashing-against-different-types-of-malware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Fuzzy Hashing</category><category>Malware</category></item><item><title>Fuzzy Hashing Techniques in Applied Malware Analysis</title><link>https://www.sei.cmu.edu/blog/fuzzy-hashing-techniques-in-applied-malware-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post describes efforts to develop fuzzy hashing, a technique to help analysts determine if two pieces of suspected malware are similar.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David French</dc:creator><pubDate>Mon, 28 Mar 2011 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/fuzzy-hashing-techniques-in-applied-malware-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category><category>Fuzzy Hashing</category></item></channel></rss>