BinComp: A Stratified Approach to Compiler Provenance Attribution A Rahimian, P Shirani, S Alrabaee, L Wang, M Debbabi Digital Investigation 14 (1), 146-155, 2015 | 71 | 2015 |
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables L Nouh, A Rahimian, D Mouheb, M Debbabi, A Hanna IFIP International Conference on ICT Systems Security and Privacy Protection …, 2017 | 52 | 2017 |
On the Reverse Engineering of the Citadel Botnet A Rahimian, R Ziarati, S Preda, M Debbabi Foundations and Practice of Security, 408-425, 2014 | 45 | 2014 |
Formulating and Choosing Strategies Using SWOT Analysis and QSPM Matrix: A Case Study NF Hashemi, MM Mazdeh, A Razeghi, A Rahimian Proceedings of the 41st International Conference on Computers & Industrial …, 2011 | 44* | 2011 |
RESource: A Framework for Online Matching of Assembly with Open Source Code A Rahimian, P Charland, S Preda, M Debbabi Foundations and Practice of Security, 211-226, 2013 | 24 | 2013 |
Enhanced RF Steerable Beamforming Networks Based on Butler Matrix and Rotman Lens for ITS Applications A Rahimian, A Rahimian IEEE Computational Technologies in Electrical and Electronics Engineering …, 2010 | 16 | 2010 |
Binary Analysis Overview S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity, 7-44, 2020 | 8 | 2020 |
Compiler provenance attribution S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020 | 5 | 2020 |
Binary Code Fingerprinting for Cybersecurity, Application to Malicious Code Fingerprinting S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... | 5* | 2020 |
Authorship Attribution S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020 | 2 | 2020 |
Library Function Identification S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020 | 1 | 2020 |
A Heuristic Approach for Rectangular Guillotine Cutting Stock Problem NF Hashemi, MB Aryanezhad, A Rahimian, A Riazi, A Razeghi Computers and Industrial Engineering (CIE), Los Angeles, CA USA, 355-360, 2011 | 1* | 2011 |
Clone Detection S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020 | | 2020 |
Free Open-Source Software Fingerprinting S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020 | | 2020 |
Function Fingerprinting S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020 | | 2020 |
Identifying Reused Functions in Binary Code S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ... Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020 | | 2020 |
Assembly to Open Source Code Matching for Reverse Engineering and Malware Analysis A Rahimian Concordia University, 2013 | | 2013 |