Follow
Paria Shirani
Paria Shirani
University of Ottawa
Verified email at andrew.cmu.edu
Title
Cited by
Cited by
Year
Sigma: A semantic integrated graph matching approach for identifying reused functions in binary code
S Alrabaee, P Shirani, L Wang, M Debbabi
Digital Investigation 12, S61-S71, 2015
822015
FOSSIL A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries
S Alrabaee, P Shirani, L Wang, M Debbabi
ACM Transactions on Privacy and Security (TOPS) 21 (2), 1-34, 2018
722018
On the feasibility of malware authorship attribution
S Alrabaee, P Shirani, M Debbabi, L Wang
Foundations and Practice of Security: 9th International Symposium, FPS 2016 …, 2017
662017
Binshape: Scalable and robust binary library function identification using function shape
P Shirani, L Wang, M Debbabi
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
612017
Bincomp: A stratified approach to compiler provenance attribution
A Rahimian, P Shirani, S Alrbaee, L Wang, M Debbabi
Digital Investigation 14, S146-S155, 2015
612015
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices
P Shirani, L Collard, BL Agba, B Lebel, M Debbabi, L Wang, A Hanna
Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018
572018
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies
A Qasem, P Shirani, M Debbabi, L Wang, B Lebel, BL Agba
ACM Computing Surveys (CSUR) 54 (2), 1-42, 2021
452021
Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection
A Chohra, P Shirani, EMB Karbab, M Debbabi
Computers & Security 117, 102684, 2022
252022
On leveraging coding habits for effective binary authorship attribution
S Alrabaee, P Shirani, L Wang, M Debbabi, A Hanna
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
232018
A method for intrusion detection in web services based on time series
P Shirani, MA Azgomi, S Alrabaee
2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering …, 2015
162015
Binary Analysis Overview
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 7-44, 2020
72020
Decoupling coding habits from functionality for effective binary authorship attribution
S Alrabaee, P Shirani, L Wang, M Debbabi, A Hanna
Journal of Computer Security 27 (6), 613-648, 2019
72019
CPID: Insider Threat Detection using Profiling and Cyber-Persona Identification
B Racherache, P Shirani, A Soeanu, M Debbabi
Computers & Security, 103350, 2023
42023
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Springer Nature, 2020
42020
Compiler provenance attribution
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020
32020
Daedalus: Network Anomaly Detection on IDS Stream Logs
A Chohra, M Debbabi, P Shirani
International Symposium on Foundations and Practice of Security, 95-111, 2018
32018
Authorship Attribution
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 211-230, 2020
22020
Cloud S&P 2023
S Majumdar, C Wang, I Ahmed, C Assi, E Bou-Harb, M Conti, H Cui, ...
Applied Cryptography and Network Security Workshops: ACNS 2023 Satellite …, 2023
2023
Optimized Feature Selection for Network Anomaly Detection
A Chohra, P Shirani, EMB Karbab, M Debbabi
Innovations in Digital Forensics, 51-98, 2023
2023
Innovations In Digital Forensics
S Majumdar, P Shirani, L Wang
World Scientific, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20