Paria Shirani
Paria Shirani
Dirección de correo verificada de encs.concordia.ca
Título
Citado por
Citado por
Año
Sigma: A semantic integrated graph matching approach for identifying reused functions in binary code
S Alrabaee, P Shirani, L Wang, M Debbabi
Digital Investigation 12, S61-S71, 2015
532015
On the feasibility of malware authorship attribution
S Alrabaee, P Shirani, M Debbabi, L Wang
International Symposium on Foundations and Practice of Security, 256-272, 2016
292016
Bincomp: A stratified approach to compiler provenance attribution
A Rahimian, P Shirani, S Alrbaee, L Wang, M Debbabi
Digital Investigation 14, S146-S155, 2015
292015
FOSSIL A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries
S Alrabaee, P Shirani, L Wang, M Debbabi
ACM Transactions on Privacy and Security (TOPS) 21 (2), 1-34, 2018
242018
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape
P Shirani, L Wang, M Debbabi
International Conference on Detection of Intrusions and Malware, and …, 2017
232017
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices
P Shirani, L Collard, BL Agba, B Lebel, M Debbabi, L Wang, A Hanna
International Conference on Detection of Intrusions and Malware, and …, 2018
182018
On Leveraging Coding Habits for Effective Binary Authorship Attribution
S Alrabaee, P Shirani, L Wang, M Debbabi, A Hanna
European Symposium on Research in Computer Security, 26-47, 2018
102018
A method for intrusion detection in web services based on time series
P Shirani, MA Azgomi, S Alrabaee
2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering …, 2015
82015
Decoupling coding habits from functionality for effective binary authorship attribution
S Alrabaee, P Shirani, L Wang, M Debbabi, A Hanna
Journal of Computer Security 27 (6), 613-648, 2019
12019
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Springer Nature, 2020
2020
Compiler Provenance Attribution
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 45-78, 2020
2020
Binary Analysis Overview
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 7-44, 2020
2020
Authorship Attribution
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 211-230, 2020
2020
Clone Detection
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 187-209, 2020
2020
Free Open-Source Software Fingerprinting
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 157-186, 2020
2020
Library Function Identification
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 79-99, 2020
2020
Function Fingerprinting
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 123-155, 2020
2020
Identifying Reused Functions in Binary Code
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 101-122, 2020
2020
Daedalus: Network Anomaly Detection on IDS Stream Logs
A Chohra, M Debbabi, P Shirani
International Symposium on Foundations and Practice of Security, 95-111, 2018
2018
BinShape: Scalable and Robust Binary Library Function Identification Using Diverse Features
P Shirani, L Wang, M Debbabi
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20