Paria Shirani
Orcid: 0000-0001-5592-1518
According to our database1,
Paria Shirani
authored at least 17 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
2023
Comput. Secur., September, 2023
On Reducing Underutilization of Security Standards by Deriving Actionable Rules: An Application to IoT.
Proceedings of the Security Standardisation Research - 8th International Conference, 2023
Proceedings of the 33rd Annual International Conference on Computer Science and Software Engineering, 2023
2022
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies.
ACM Comput. Surv., 2022
Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection.
Comput. Secur., 2022
2020
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting
Advances in Information Security 78, Springer, ISBN: 978-3-030-34237-1, 2020
2019
Decoupling coding habits from functionality for effective binary authorship attribution.
J. Comput. Secur., 2019
2018
<i>FOSSIL</i>: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries.
ACM Trans. Priv. Secur., 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Proceedings of the Computer Security, 2018
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
2017
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
2015
Digit. Investig., 2015
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code.
Digit. Investig., 2015
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015