You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A couple ideas for approaching this (just spitballing, possible better solutions exist as well):
taking a cryptographic hash of a file (language agnostic but inflexible to minor code changes)
computing a locality-sensitive hash of the malicious file using opcode disassembly or AST features (python-specific)
the similarity of another file to a known malicious hash could be taken using the Levinshtein distance of the hash of a file with a known malicious file's hash.
This would obviously require a database of some sort (and committing thereto malicious file hashes in response to reports).
The text was updated successfully, but these errors were encountered:
A couple ideas for approaching this (just spitballing, possible better solutions exist as well):
This would obviously require a database of some sort (and committing thereto malicious file hashes in response to reports).
The text was updated successfully, but these errors were encountered: