Malware Protection Techniques (Part 2): Signatures

Поділитися
Вставка
  • Опубліковано 27 гру 2024

КОМЕНТАРІ • 4

  • @mylosovich24
    @mylosovich24 8 місяців тому

    11 year old gem of a vid

  • @dmknght8946
    @dmknght8946 3 роки тому

    This is very underrated video.

  • @calumbrunt3215
    @calumbrunt3215 9 років тому

    What about estimating Kolmogorov Complexity to assign a signature and working out normalized compression distance to compare two signatures? Which category would you put that into?

    • @DieLazergurken
      @DieLazergurken 3 роки тому

      Well, that depends on which mathematical object you want to define the Kolmogorov Complexity. In my eyes it is most similar to a hashing function but it lacks the uniqueness even more. Two different mathematical objects can have the same Kolmogorov Complexity.