Paria Shirani Google Scholar LinkedIn

Research Interest: Cybersecurity, IoT Security, Vulnerability Research, Binary Code Fingerprinting and Malware Analysis, Network Security, Machine Learning.

Publications

  • Aniss Chohra, Paria Shirani, Mouatez Karbab, and Mourad Debbabi. (2022). “Chameleon: Optimized Feature Selection using Particle Swarm Optimization and Ensemble Methods for Network Anomaly Detection.” Computers & Security, 102684
  • Abdullah Qasem*, Paria Shirani*, Mourad Debbabi, Lingyu Wang, Bernard Lebel, Basile L. Agba. "Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies", ACM Computing Surveys (CSUR) 54, no. 2 (2021): 1-42.(*) The first and second authors equally contributed.
  • [Book] Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, and Aiman Hanna. "Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting", (Vol. 78). Springer Nature, Springer. 2020.
  • Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, and Aiman Hanna. "On Leveraging Coding Habits for Effective Binary Authorship Attribution", Journal of Computer Security (JCS). 27(6): 613-648 (2019).
  • Saed Alrabaee*, Paria Shirani*, Lingyu Wang, and Mourad Debbabi. (2018) "FOSSIL: a resilient and efficient system for identifying FOSS functions in malware binaries." ACM Transactions on Privacy and Security (TOPS) . 21 (2), 8:1-8:34, 2018. (*) The first and second authors equally contributed.
  • Aniss Chohra, Mourad Debbabi, and Paria Shirani. (2018) "Daedalus: Network Anomaly Detection on IDS Stream Logs", The 11th International Symposium on Foundations & Practice of Security (FPS'18), pp. 95-111. Acceptance rate: 34.8%.
  • Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, and Aiman Hanna. (2018) "On leveraging coding habits for effective binary authorship attribution." In European Symposium on Research in Computer Security (ESORICS'18), pp. 26-47. (Acceptance rate: 19.7%).
  • Paria Shirani, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi, Lingyu Wang, and Aiman Hanna. "BinARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices." (2018) In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'18), pp. 114-138. (Acceptance rate: 30.5%).
  • Paria Shirani, Lingyu Wang, and Mourad Debbabi. (2017) "BinShape: Scalable and robust binary library function identification using function shape." In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'17), pp. 301-324. (Acceptance rate: 26.8%).
  • Saed Alrabaee, Paria Shirani, Mourad Debbabi, and Lingyu Wang. (2016) "On the feasibility of malware authorship attribution." In International Symposium on Foundations and Practice of Security (FPS'16), pp. 256-272.
  • Ashkan Rahimian, Paria Shirani, Saed Alrbaee, Lingyu Wang, and Mourad Debbabi. (2015) "BinComp: a stratified approach to compiler provenance attribution." Digital Investigation 14 (1), S146-S155.
  • Saed Alrabae, Paria Shirani, Lingyu Wang, and Mourad Debbabi. (2015) "SIGMA: a semantic integrated graph matching approach for identifying reused functions in binary code." Digital Investigation 12 (1), S61-S71.
  • Paria Shirani, Mohammad Abdollahi Azgomi, and Saed Alrabaee. (2015) "A method for intrusion detection in web services based on time series." In IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE'15), pp. 836-841.

Teaching

Upcoming

  • Discrete Structures (CPS 420) - Winter 2022
  • Computer Organization II (CPS 310) - Winter 2022

Past

Teaching Assistant at Concordia University

  • Data Structures and Algorithms (COMP 352)
  • Object Oriented Programming I (COMP 248)
  • Information Systems Security (SOEN 321)

Professional Services

  • Journal Reviewer: IEEE Transactions on Dependable and Secure Computing (TDSC), IEEE Transactions on Software Engineering (TSE), Elsevier Computers & Security, ACM Transactions on Embedded Computing Systems (ACM TECS), Journal of Intelligent & Fuzzy Systems (JIFS)
  • Program Committee Member: The 19th Annual International Conference on Privacy, Security, and Trust (PST 2022) IEEE International Conference on Cyber-Security and Resilience (IEEE CSR 2022), The 37th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2022), The 4th workshop on Cloud Security and Privacy (CLOUD S&P 2022), The 2nd International Symposium on Future Cyber Security Technologies (FCST'21), The 36th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2021), IEEE International Conference on Cyber-Security and Resilience (IEEE CSR 2021), The 2nd workshop on Cloud Security and Privacy (CLOUD S&P 2020) co-located with ACNS'20, The 35th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2020), The 12th International symposium on foundations & practice of security (FPS'19), The 2nd International Symposium on Future Cyber Security Technologies (FCST'19), The 16th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA'19), The 11th International symposium on foundations & practice of security (FPS'18)
  • Othe Memberships: Local Organization Chair, 11th International Symposium on Foundations & Practice of Security (FPS'18), Session Chair, 9th International Symposium on Foundations & Practice of Security (FPS'16)

Selected Honors and Awards

  • Natural Sciences and Engineering Research Council of Canada (NSERC) Postdoctoral Fellowships
  • Fonds de recherche du Québec-Nature et technologies (FRQNT) Scholarship (B2), Ranked 3rd in all Québec
  • Concordia Teaching Excellence Award 2016-2017
  • Professor Hugh McQueen Award of Excellence Award
  • Fondation Universitaire Pierre Arbour Scholarship