S. M. Ghaffarian, Hamid Reza Shahriari,
“ Neural software vulnerability analysis using rich intermediate graph representations of programs ”,
Information Sciences, Vol. 553, April 2021, Pages 189-207.
M. Ghorbanzadeh, Hamid Reza Shahriari,
“Detecting application logic vulnerabilities via finding incompatibility between application design and implementation”,
IET, Software, Vol. 14, Issue 4, August 2020, p. 377-388.
H. Homaei, H.R. Shahriari,
“Athena: a Framework to Automatically Generate Security Test Oracle via Extracting Policies from Source Code and Intended Software Behaviour”,
Information and Software Technology, vol 107, Elsevier, Mar 2019.
M.S. Khazaei, H. Homaei, H.R. Shahriari,
“OPEXA: Analyser Assistant For Detecting Over-privileged Extensions”,
IET Information Security, vol 12, issue 06, IET, Nov 2018.
S.M. Ghaffarian, H.R. Shahriari,
“Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey”,
ACM Computing Surveys (CSUR), vol 50, issue 4, article 56, Nov 2017.
H. Homaei, H.R. Shahriari,
“Seven Years of Software Vulnerabilities: The Ebb and Flow”,
IEEE Security & Privacy, vol. 15, issue 01, Feb 2017.
2021
S. M. Ghaffarian, Hamid Reza Shahriari,
“Neural software vulnerability analysis using rich intermediate graph representations of programs”,
Information Sciences, Vol. 553, April 2021, Pages 189-207.
[ Publisher ]
2020
M. Ghorbanzadeh, Hamid Reza Shahriari,
“Detecting application logic vulnerabilities via finding incompatibility between application design and implementation”,
IET, Software, Vol. 14, Issue 4, August 2020, p. 377-388
[ Publisher ]
M. Ghorbanzadeh, Hamid Reza Shahriari,
“ANOVUL: Detection of Logic Vulnerabilities in Annotated Programs via Data and Control Flow Analysis”,
IET Information Security, Volume 14, Issue 3, May 2020, p. 352-364
[ Publisher ]
2019
S. Esmaeili, H.R. Shahriari
“PodBot: A New Botnet Detection Method by Host and Network-Based Analysis”,
2019 27th Iranian Conference on Electrical Engineering (ICEE)
[ Publisher ]
[ PDF ]
H. Homaei, H.R. Shahriari,
“Athena: a Framework to Automatically Generate Security Test Oracle via Extracting Policies from Source Code and Intended Software Behaviour”,
Information and Software Technology, Elsevier, vol 107, March 2019, Pages 112-124.
[ Publisher ]
[ PDF ]
2018
M. Behniafar, A.R. Nowroozi, H.R. Shahriari,
“A Survey of Anomaly Detection Approaches in Internet of Things”,
The ISC International Journal of Information Security (iSeCure), vol 10, issue 02, 2018.
[ Publisher ]
[ PDF ]
A. Zare, H.R. Shahriari,
“BotcoinTrap: Detection of Bitcoin Miner Botnet Using Host Based Approach”,
15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Aug 2018.
[ Publisher ]
[ PDF ]
S. Salehi, H.R. Shahriari, M.M. Ahmadian, L. Tazik,
“A Novel Approach for Detecting DGA-based Ransomwares”,
15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Aug 2018.
[ Publisher ]
Z. Bohluli, H.R. Shahriari,
“Detecting Privacy Leaks in Android Apps using Inter-Component Information Flow Control Analysis”,
15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Aug 2018.
[ Publisher ]
M. Khoshnoud Mansourkhani, S.M. Ghaffarian, H.R. Shahriari,
“A Hybrid Method for Privacy Preserving in Publishing Bigdata”,
15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Aug 2018, (In Farsi).
[ Publisher ]
M.S. Khazaei, H. Homaei, H.R. Shahriari,
“OPEXA: Analyser Assistant For Detecting Over-privileged Extensions”,
IET Information Security, vol 12, issue 06, IET, Nov 2018.
[ Publisher ]
2017
S.M. Ghaffarian, H.R. Shahriari,
“Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey”,
ACM Computing Surveys (CSUR), vol 50, issue 4, article 56, Nov 2017.
[ Publisher ]
E. Khoshhalpour, H.R. Shahriari,
“BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle”,
The ISC International Journal of Information Security (iSeCure), vol 10, issue 01, July 2017.
[ Publisher ]
[ PDF ]
H. Homaei, H.R. Shahriari,
“Seven Years of Software Vulnerabilities: The Ebb and Flow”,
IEEE Security & Privacy, vol. 15, issue 01, Feb 2017.
[ Publisher ]
[ PDF ]
A.A. Sadeghi, F. Aminmansour, H.R. Shahriari,
“Dwarf Frankenstein is Still in Your Memory: Tiny Code Reuse Attacks”,
The ISC International Journal of Information Security (iSeCure), vol 9, issue 01, Jan 2017.
[ Publisher ]
2016
M.M. Ahmadian, H.R. Shahriari,
“2entFOX: A Framework for High Survivable Ransomwares Detection”,
13th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Sep 2016.
[ Publisher ]
A. Khoshkbarchi, H.R. Shahriari,
“Coping with Unfair Ratings in Reputation Systems Based on Learning Approach”,
Enterprise Information Systems, vol 11, issue 10, Taylor & Francis, Aug 2016.
[ Publisher ]
F. Aminmansour, H.R. Shahriari,
“Aggrandizing the Beasts Limbs: Patulous Code Reuse Attack on ARM Architecture”,
The ISC International Journal of Information Security (iSeCure), vol 8, issue 01, Jan 2017.
[ Publisher ]
[ PDF ]
2015
A.A. Sadeghi, F. Aminmansour, H.R. Shahriari,
“Tiny Jump-oriented Programming Attack (A Class of Code Reuse Attacks)”,
12th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Sep 2015.
[ Publisher ]
M.M. Ahmadian, H.R. Shahriari, S.M. Ghaffarian,
“Connection-Monitor & Connection-Breaker: a Novel Approach for Prevention and Detection of High Survivable Ransomwares”,
12th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Sep 2015.
[ Publisher ]
F. Aminmansour, H.R. Shahriari,
“Patulous Code Reuse Attack: a Novel Code Reuse Attack on ARM Architecture (a Proof of Concept on Android OS)”,
12th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Sep 2015.
[ Publisher ]
A. Khoshkbarchi, H.R. Shahriari,
“Learning Approach For Dealing With Unfair Ratings In Service Provision”,
23rd Iranian Conference on Electrical Engineering (ICEE), May 2015.
[ Publisher ]
[ PDF ]
2014
M. Doroudian, H.R. Shahriari,
“Database Intrusion Detection System for Detecting Malicious Behaviors in Transaction and Inter-Transaction Levels”,
7th International Symposium on Telecommunications (IST), Sep 2014.
[ Publisher ]
A. Khoshkbarchi, H.R. Shahriari, M. Amjadi,
“A Trust Model for Service Selection Using Learning Automata Based Approach”,
7th International Symposium on Telecommunications (IST), Sep 2014.
[ Publisher ]
S. Saadat, H.R. Shahriari,
“Towards a Process Oriented Framework for Improving Trust and Security in Migration to Cloud”,
11th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Sep 2014.
[ Publisher ]
A.A. Sadeghi, F. Aminmansour, H.R. Shahriari,
“Tazhi: a Novel Technique for Hunting Trampoline Gadgets of Jump Oriented Programming (a Class of Code Reuse Attacks)”,
11th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Sep 2014.
[ Publisher ]
A. Khoshkbarchi, H.R. Shahriari, M. Amjadi,
“Comparison-based Agent Partitioning with Learning Automata: a Trust Model for Service Oriented Environments”,
11th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Sep 2014.
[ Publisher ]
M. Doroudian, H.R. Shahriari,
“A Hybrid Approach for Database Intrusion Detection at Transaction and Inter Transaction Levels”,
6th Conference on Information and Knowledge Technology (IKT), May 2014.
[ Publisher ]
2013
Sh. Mardani, H.R. Shahriari,
“A New Method for Occupational Fraud Detection in Process Aware Information Systems”,
10th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Aug 2013.
[ Publisher ]
F. Shafiee-Nezhad, H.R. Shahriari,
“Fuzzy Logic and Takagi-Sugeno Neural Fuzzy to Deutsche Bank Fraud Transactions”,
7th International Conference on e-Commerce in Developing Countries (with focus on e-Security), Apr 2013.
[ Publisher ]
H. Mohammadhassanzadeh, H.R. Shahriari,
“Prediction of Users Trustworthiness in Web-based Social Networks via Text Mining”,
The ISC International Journal of Information Security (iSeCure), vol 5, issue 02, 2013.
[ Publisher ]
[ PDF ]
2012
H. Mohammadhassanzadeh, H.R. Shahriari,
“Using User Similarity to Infer Trust Values in Social Networks Regardless of Direct Ratings”,
9th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Sep 2012.
[ Publisher ]
I. Loloei, H.R. Shahriari, A. Sadeghi,
“A Model for Asset Valuation in Security Risk Analysis Regarding Assets Dependencies”,
20th Iranian Conference on Electrical Engineering (ICEE), May 2012.
[ Publisher ]
M. Mansoury, H.R. Shahriari, M. Shajari,
“Trust Evaluation Using Items Ratings in Online Communities”,
20th Iranian Conference on Electrical Engineering (ICEE), May 2012.
[ Publisher ]
2011
M.A. Morid, A. Omidvar, H.R. Shahriari,
“An Enhanced Method for Computation of Similarity between the Contexts in Trust Evaluation Using Weighted Ontology”,
10th International Conference on Trust, Security and Privacy in Computing and Communications, Nov 2011.
[ Publisher ]
H. Homaei, H.R. Shahriari,
“Compositional Approach to Quantify the Vulnerability of Computer Systems”,
The Computer Journal, vol 54, issue 10, Oxford University Press, Oct 2011.
[ Publisher ]
[ PDF ]
2010
A. Esmaeeli, H.R. Shahriari,
“Privacy Protection of Grid Service Requesters through Distributed Attribute Based Access Control Model”,
5th International Conference on Grid and Pervasive Computing (GPC), May 2010.
[ Publisher ]
H.R. Shahriari, M.S. Makarem, M. Sirjani, R. Jalili, A. Movaghar,
“Vulnerability Analysis of Networks to Detect Multi-phase Attacks Using the Actor-based Language Rebeca”,
Computers & Electrical Engineering, vol 36, issue 05, Elsevier, Sep 2010.
[ Publisher ]
H.R. Shahriari, R. Jalili,
“Vulnerability Take Grant (VTG): an Efficient Approach to Analyze Network Vulnerabilities”,
Computers & Security, vol. 26, issue 05, Elsevier, Aug 2007.
[ Publisher ]
M. Amini, R. Jalili, H.R. Shahriari,
“RT-UNNID: a Practical Solution to Real-Time Network-based Intrusion Detection Using Unsupervised Neural Networks”,
Computers & Security, vol 25, issue 06, Elsevier, Sep 2006.
[ Publisher ]