Automatic vulnerability detection in embedded devices and firmware: Survey and layered taxonomies A Qasem, P Shirani, M Debbabi, L Wang, B Lebel, BL Agba ACM Computing Surveys (CSUR) 54 (2), 1-42, 2021 | 72 | 2021 |
Binary function clone search in the presence of code obfuscation and optimization over multi-cpu architectures A Qasem, M Debbabi, B Lebel, M Kassouf Proceedings of the 2023 acm asia conference on computer and communications …, 2023 | 16 | 2023 |
Finding a needle in a haystack: The traffic analysis version A Qasem, S Zhioua, K Makhlouf Proceedings on Privacy Enhancing Technologies, 2019 | 13 | 2019 |
OctopusTaint: Advanced Data Flow Analysis for Detecting Taint-Based Vulnerabilities in IoT/IIoT Firmware A Qasem, M Debbabi, A Soeanu Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | | 2024 |
Modularizing Directed Greybox Fuzzing for Binaries over Multiple CPU Architectures S Benahmed, A Qasem, A Lounis, M Debbabi International Conference on Detection of Intrusions and Malware, and …, 2024 | | 2024 |
Detection of Cyber Attacks on Synchro-Phasor Network Targeting Topology Detection Application of Power Distribution Grids A Ebtia, DE Rebbah, A Qasem, M Ghafouri, D Jafarigiv, M Debbabi, ... 2023 IEEE International Conference on Communications, Control, and Computing …, 2023 | | 2023 |
Network Traffic Analysis Using Approximate Hash Matching A Qasem King Fahd University of Petroleum and Minerals (Saudi Arabia) , 2017 | | 2017 |