Ashkan Rahimian
Ashkan Rahimian
Researcher, Concordia Institute for Information Systems Engineering
Verified email at encs.concordia.ca
Title
Cited by
Cited by
Year
On the Reverse Engineering of the Citadel Botnet
A Rahimian, R Ziarati, S Preda, M Debbabi
Foundations and Practice of Security, 408-425, 2014
372014
Formulating and Choosing Strategies Using SWOT Analysis and QSPM Matrix: A Case Study
NF Hashemi, MM Mazdeh, A Razeghi, A Rahimian
Proceedings of the 41st International Conference on Computers & Industrial …, 2011
29*2011
BinComp: A Stratified Approach to Compiler Provenance Attribution
A Rahimian, P Shirani, S Alrabaee, L Wang, M Debbabi
Digital Investigation 14 (1), 146-155, 2015
282015
RESource: A Framework for Online Matching of Assembly with Open Source Code
A Rahimian, P Charland, S Preda, M Debbabi
Foundations and Practice of Security, 211-226, 2013
142013
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables
L Nouh, A Rahimian, D Mouheb, M Debbabi, A Hanna
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2017
132017
Enhanced RF Steerable Beamforming Networks Based on Butler Matrix and Rotman Lens for ITS Applications
A Rahimian, A Rahimian
IEEE Computational Technologies in Electrical and Electronics Engineering …, 2010
102010
A Heuristic Approach for Rectangular Guillotine Cutting Stock Problem
NF Hashemi, MB Aryanezhad, A Rahimian, A Riazi, A Razeghi
Computers and Industrial Engineering (CIE), Los Angeles, CA USA, 355-360, 2011
1*2011
Compiler Provenance Attribution
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 45-78, 2020
2020
Binary Analysis Overview
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 7-44, 2020
2020
Authorship Attribution
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 211-230, 2020
2020
Clone Detection
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 187-209, 2020
2020
Free Open-Source Software Fingerprinting
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 157-186, 2020
2020
Binary Code Fingerprinting for Cybersecurity, Application to Malicious Code Fingerprinting
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
2020
Library Function Identification
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 79-99, 2020
2020
Function Fingerprinting
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 123-155, 2020
2020
Identifying Reused Functions in Binary Code
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 101-122, 2020
2020
Assembly to Open Source Code Matching for Reverse Engineering and Malware Analysis
A Rahimian
Concordia University, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–17