[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/CTC.2013.9guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

TLSH -- A Locality Sensitive Hash

Published: 21 November 2013 Publication History

Abstract

Cryptographic hashes such as MD5 and SHA-1 are used for many data mining and security applications -- they are used as an identifier for files and documents. However, if a single byte of a file is changed, then cryptographic hashes result in a completely different hash value. It would be very useful to work with hashes which identify that files were similar based on their hash values. The security field has proposed similarity digests, and the data mining community has proposed locality sensitive hashes. Some proposals include the Nilsimsa hash (a locality sensitive hash), Ssdeep and Sdhash (both Ssdeep and Sdhash are similarity digests). Here, we describe a new locality sensitive hashing scheme the TLSH. We provide algorithms for evaluating and comparing hash values and provide a reference to its open source code. We do an empirical evaluation of publically available similarity digest schemes. The empirical evaluation highlights significant problems with previously proposed schemes; the TLSH scheme does not suffer from the flaws identified.

Cited By

View all
  • (2024)BinEq - A Benchmark of Compiled Java Programs to Assess Alternative BuildsProceedings of the 2024 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses10.1145/3689944.3696162(15-25)Online publication date: 19-Nov-2024
  • (2024)A Machine Learning approach for anomaly detection on the Internet of Things based on Locality-Sensitive HashingIntegration, the VLSI Journal10.1016/j.vlsi.2024.10215996:COnline publication date: 1-May-2024
  • (2024)Perceptual Hashing on Image-based Malware DetectionProcedia Computer Science10.1016/j.procs.2024.02.151234:C(51-61)Online publication date: 17-Jul-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CTC '13: Proceedings of the 2013 Fourth Cybercrime and Trustworthy Computing Workshop
November 2013
68 pages
ISBN:9781479930760

Publisher

IEEE Computer Society

United States

Publication History

Published: 21 November 2013

Author Tags

  1. Locality sensitive hash
  2. Nilsimsa
  3. Sdhash
  4. Ssdeep
  5. TLSH.
  6. data fingerprinting
  7. fuzzy hashing
  8. similarity digests

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)BinEq - A Benchmark of Compiled Java Programs to Assess Alternative BuildsProceedings of the 2024 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses10.1145/3689944.3696162(15-25)Online publication date: 19-Nov-2024
  • (2024)A Machine Learning approach for anomaly detection on the Internet of Things based on Locality-Sensitive HashingIntegration, the VLSI Journal10.1016/j.vlsi.2024.10215996:COnline publication date: 1-May-2024
  • (2024)Perceptual Hashing on Image-based Malware DetectionProcedia Computer Science10.1016/j.procs.2024.02.151234:C(51-61)Online publication date: 17-Jul-2024
  • (2023)V1SCANProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620603(6541-6556)Online publication date: 9-Aug-2023
  • (2023)Efficient Malware Analysis Using Metric EmbeddingsDigital Threats: Research and Practice10.1145/36156695:1(1-20)Online publication date: 16-Aug-2023
  • (2023)AVScan2Vec: Feature Learning on Antivirus Scan Data for Production-Scale Malware CorporaProceedings of the 16th ACM Workshop on Artificial Intelligence and Security10.1145/3605764.3623907(185-196)Online publication date: 30-Nov-2023
  • (2023)A Practical Attack on the TLSH Similarity Digest SchemeProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3600173(1-10)Online publication date: 29-Aug-2023
  • (2023)Third-Party Library Dependency for Large-Scale SCA in the C/C++ Ecosystem: How Far Are We?Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3597926.3598143(1383-1395)Online publication date: 12-Jul-2023
  • (2023)Increasing the Robustness of a Machine Learning-based IoT Malware Detection Method with Adversarial TrainingProceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning10.1145/3586209.3591401(3-8)Online publication date: 1-Jun-2023
  • (2023)Poster Abstract: SmartAppZoo: a Repository of SmartThings Apps for IoT BenchmarkingProceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation10.1145/3576842.3589162(448-449)Online publication date: 9-May-2023
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media