Paria Shirani

Orcid: 0000-0001-5592-1518

According to our database1, Paria Shirani authored at least 16 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
CPID: Insider threat detection using profiling and cyber-persona identification.
Comput. Secur., September, 2023

On Reducing Underutilization of Security Standards by Deriving Actionable Rules: An Application to IoT.
Proceedings of the Security Standardisation Research - 8th International Conference, 2023

Towards Cross-Architecture Binary Code Vulnerability Detection.
Proceedings of the 33rd Annual International Conference on Computer Science and Software Engineering, 2023

2022
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies.
ACM Comput. Surv., 2022

Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection.
Comput. Secur., 2022

2020
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting
Advances in Information Security 78, Springer, ISBN: 978-3-030-34237-1, 2020

2019
Decoupling coding habits from functionality for effective binary authorship attribution.
J. Comput. Secur., 2019

2018
<i>FOSSIL</i>: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries.
ACM Trans. Priv. Secur., 2018

Daedalus: Network Anomaly Detection on IDS Stream Logs.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

On Leveraging Coding Habits for Effective Binary Authorship Attribution.
Proceedings of the Computer Security, 2018

BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

2017
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
On the Feasibility of Malware Authorship Attribution.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

2015
BinComp: A stratified approach to compiler provenance Attribution.
Digit. Investig., 2015

SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code.
Digit. Investig., 2015

A method for intrusion detection in web services based on time series.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015


  Loading...