Sigma: A semantic integrated graph matching approach for identifying reused functions in binary code S Alrabaee, P Shirani, L Wang, M Debbabi Digital Investigation 12, S61-S71, 2015 | 82 | 2015 |
FOSSIL A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries S Alrabaee, P Shirani, L Wang, M Debbabi ACM Transactions on Privacy and Security (TOPS) 21 (2), 1-34, 2018 | 73 | 2018 |
On the feasibility of malware authorship attribution S Alrabaee, P Shirani, M Debbabi, L Wang Foundations and Practice of Security: 9th International Symposium, FPS 2016 …, 2017 | 67 | 2017 |
Bincomp: A stratified approach to compiler provenance attribution A Rahimian, P Shirani, S Alrbaee, L Wang, M Debbabi Digital Investigation 14, S146-S155, 2015 | 62 | 2015 |
Binshape: Scalable and robust binary library function identification using function shape P Shirani, L Wang, M Debbabi Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017 | 61 | 2017 |
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices P Shirani, L Collard, BL Agba, B Lebel, M Debbabi, L Wang, A Hanna Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018 | 59 | 2018 |
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies A Qasem, P Shirani, M Debbabi, L Wang, B Lebel, BL Agba ACM Computing Surveys (CSUR) 54 (2), 1-42, 2021 | 51 | 2021 |
Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection A Chohra, P Shirani, EMB Karbab, M Debbabi Computers & Security 117, 102684, 2022 | 28 | 2022 |
On leveraging coding habits for effective binary authorship attribution S Alrabaee, P Shirani, L Wang, M Debbabi, A Hanna Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 23 | 2018 |
A method for intrusion detection in web services based on time series P Shirani, MA Azgomi, S Alrabaee 2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering …, 2015 | 16 | 2015 |
Binary Analysis Overview S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity, 7-44, 2020 | 7 | 2020 |
Decoupling coding habits from functionality for effective binary authorship attribution S Alrabaee, P Shirani, L Wang, M Debbabi, A Hanna Journal of Computer Security 27 (6), 613-648, 2019 | 7 | 2019 |
CPID: Insider Threat Detection using Profiling and Cyber-Persona Identification B Racherache, P Shirani, A Soeanu, M Debbabi Computers & Security, 103350, 2023 | 4 | 2023 |
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Springer Nature, 2020 | 4 | 2020 |
Compiler provenance attribution S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020 | 4 | 2020 |
Daedalus: Network Anomaly Detection on IDS Stream Logs A Chohra, M Debbabi, P Shirani International Symposium on Foundations and Practice of Security, 95-111, 2018 | 3 | 2018 |
Authorship Attribution S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity, 211-230, 2020 | 2 | 2020 |
Cloud S&P 2023 S Majumdar, C Wang, I Ahmed, C Assi, E Bou-Harb, M Conti, H Cui, ... Applied Cryptography and Network Security Workshops: ACNS 2023 Satellite …, 2023 | | 2023 |
Towards Cross-Architecture Binary Code Vulnerability Detection P Shirani, S Bhatt, A Hailane, GV Jourdan Proceedings of the 33rd Annual International Conference on Computer Science …, 2023 | | 2023 |
Optimized Feature Selection for Network Anomaly Detection A Chohra, P Shirani, EMB Karbab, M Debbabi Innovations in Digital Forensics, 51-98, 2023 | | 2023 |