Paria Shirani
Paria Shirani
Verified email at andrew.cmu.edu
Title
Cited by
Cited by
Year
Sigma: A semantic integrated graph matching approach for identifying reused functions in binary code
S Alrabaee, P Shirani, L Wang, M Debbabi
Digital Investigation 12, S61-S71, 2015
612015
Bincomp: A stratified approach to compiler provenance attribution
A Rahimian, P Shirani, S Alrbaee, L Wang, M Debbabi
Digital Investigation 14, S146-S155, 2015
382015
On the feasibility of malware authorship attribution
S Alrabaee, P Shirani, M Debbabi, L Wang
International Symposium on Foundations and Practice of Security, 256-272, 2016
372016
FOSSIL A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries
S Alrabaee, P Shirani, L Wang, M Debbabi
ACM Transactions on Privacy and Security (TOPS) 21 (2), 1-34, 2018
332018
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape
P Shirani, L Wang, M Debbabi
International Conference on Detection of Intrusions and Malware, and …, 2017
312017
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices
P Shirani, L Collard, BL Agba, B Lebel, M Debbabi, L Wang, A Hanna
International Conference on Detection of Intrusions and Malware, and …, 2018
262018
On Leveraging Coding Habits for Effective Binary Authorship Attribution
S Alrabaee, P Shirani, L Wang, M Debbabi, A Hanna
European Symposium on Research in Computer Security, 26-47, 2018
122018
A method for intrusion detection in web services based on time series
P Shirani, MA Azgomi, S Alrabaee
2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering …, 2015
112015
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies
A Qasem, P Shirani, M Debbabi, L Wang, B Lebel, BL Agba
ACM Computing Surveys (CSUR) 54 (2), 1-42, 2021
22021
Compiler Provenance Attribution
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 45-78, 2020
12020
Authorship Attribution
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 211-230, 2020
12020
Decoupling coding habits from functionality for effective binary authorship attribution
S Alrabaee, P Shirani, L Wang, M Debbabi, A Hanna
Journal of Computer Security 27 (6), 613-648, 2019
12019
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Springer Nature, 2020
2020
Binary Analysis Overview
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 7-44, 2020
2020
Clone Detection
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 187-209, 2020
2020
Free Open-Source Software Fingerprinting
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 157-186, 2020
2020
Library Function Identification
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 79-99, 2020
2020
Function Fingerprinting
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 123-155, 2020
2020
Identifying Reused Functions in Binary Code
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 101-122, 2020
2020
Daedalus: Network Anomaly Detection on IDS Stream Logs
A Chohra, M Debbabi, P Shirani
International Symposium on Foundations and Practice of Security, 95-111, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20