Follow
Ashkan Rahimian
Ashkan Rahimian
Cybersecurity AI Researcher, Concordia University - CIISE | Amazon Web Services - AWS Security
Verified email at amazon.com
Title
Cited by
Cited by
Year
BinComp: A Stratified Approach to Compiler Provenance Attribution
A Rahimian, P Shirani, S Alrabaee, L Wang, M Debbabi
Digital Investigation 14 (1), 146-155, 2015
612015
On the Reverse Engineering of the Citadel Botnet
A Rahimian, R Ziarati, S Preda, M Debbabi
Foundations and Practice of Security, 408-425, 2014
472014
Formulating and Choosing Strategies Using SWOT Analysis and QSPM Matrix: A Case Study
NF Hashemi, MM Mazdeh, A Razeghi, A Rahimian
Proceedings of the 41st International Conference on Computers & Industrial …, 2011
41*2011
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables
L Nouh, A Rahimian, D Mouheb, M Debbabi, A Hanna
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2017
392017
RESource: A Framework for Online Matching of Assembly with Open Source Code
A Rahimian, P Charland, S Preda, M Debbabi
Foundations and Practice of Security, 211-226, 2013
222013
Enhanced RF Steerable Beamforming Networks Based on Butler Matrix and Rotman Lens for ITS Applications
A Rahimian, A Rahimian
IEEE Computational Technologies in Electrical and Electronics Engineering …, 2010
132010
Binary Analysis Overview
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity, 7-44, 2020
72020
Compiler provenance attribution
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020
42020
Binary Code Fingerprinting for Cybersecurity, Application to Malicious Code Fingerprinting
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
42020
Authorship Attribution
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020
22020
A Heuristic Approach for Rectangular Guillotine Cutting Stock Problem
NF Hashemi, MB Aryanezhad, A Rahimian, A Riazi, A Razeghi
Computers and Industrial Engineering (CIE), Los Angeles, CA USA, 355-360, 2011
1*2011
Clone Detection
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020
2020
Free Open-Source Software Fingerprinting
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020
2020
Library Function Identification
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020
2020
Function Fingerprinting
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020
2020
Identifying Reused Functions in Binary Code
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020
2020
Assembly to Open Source Code Matching for Reverse Engineering and Malware Analysis
A Rahimian
Concordia University, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–17