Sigma: A semantic integrated graph matching approach for identifying reused functions in binary code S Alrabaee, P Shirani, L Wang, M Debbabi Digital Investigation 12, S61-S71, 2015 | 53 | 2015 |
On the feasibility of malware authorship attribution S Alrabaee, P Shirani, M Debbabi, L Wang International Symposium on Foundations and Practice of Security, 256-272, 2016 | 29 | 2016 |
Bincomp: A stratified approach to compiler provenance attribution A Rahimian, P Shirani, S Alrbaee, L Wang, M Debbabi Digital Investigation 14, S146-S155, 2015 | 29 | 2015 |
FOSSIL A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries S Alrabaee, P Shirani, L Wang, M Debbabi ACM Transactions on Privacy and Security (TOPS) 21 (2), 1-34, 2018 | 24 | 2018 |
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape P Shirani, L Wang, M Debbabi International Conference on Detection of Intrusions and Malware, and …, 2017 | 23 | 2017 |
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices P Shirani, L Collard, BL Agba, B Lebel, M Debbabi, L Wang, A Hanna International Conference on Detection of Intrusions and Malware, and …, 2018 | 18 | 2018 |
On Leveraging Coding Habits for Effective Binary Authorship Attribution S Alrabaee, P Shirani, L Wang, M Debbabi, A Hanna European Symposium on Research in Computer Security, 26-47, 2018 | 10 | 2018 |
A method for intrusion detection in web services based on time series P Shirani, MA Azgomi, S Alrabaee 2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering …, 2015 | 8 | 2015 |
Decoupling coding habits from functionality for effective binary authorship attribution S Alrabaee, P Shirani, L Wang, M Debbabi, A Hanna Journal of Computer Security 27 (6), 613-648, 2019 | 1 | 2019 |
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Springer Nature, 2020 | | 2020 |
Compiler Provenance Attribution S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity, 45-78, 2020 | | 2020 |
Binary Analysis Overview S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity, 7-44, 2020 | | 2020 |
Authorship Attribution S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity, 211-230, 2020 | | 2020 |
Clone Detection S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity, 187-209, 2020 | | 2020 |
Free Open-Source Software Fingerprinting S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity, 157-186, 2020 | | 2020 |
Library Function Identification S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity, 79-99, 2020 | | 2020 |
Function Fingerprinting S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity, 123-155, 2020 | | 2020 |
Identifying Reused Functions in Binary Code S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity, 101-122, 2020 | | 2020 |
Daedalus: Network Anomaly Detection on IDS Stream Logs A Chohra, M Debbabi, P Shirani International Symposium on Foundations and Practice of Security, 95-111, 2018 | | 2018 |
BinShape: Scalable and Robust Binary Library Function Identification Using Diverse Features P Shirani, L Wang, M Debbabi | | |