Search Results/Filters    

Filters

Year

Banks




Expert Group








Full-Text


Author(s): 

MOMENI B. | KHARRAZI M.

Journal: 

Scientia Iranica

Issue Info: 
  • Year: 

    2019
  • Volume: 

    26
  • Issue: 

    6 (Special Issue on: Transactions D: Computer Science & Engineering and Electrical Engineering)
  • Pages: 

    3485-3509
Measures: 
  • Citations: 

    0
  • Views: 

    171
  • Downloads: 

    131
Abstract: 

Malware analysis is essential to understanding the internal logic and intent of malware programs in order to mitigate their threats. As the analysis methods have evolved, malware authors have adopted more techniques such as the Virtualization obfuscation to protect the malware inner workings. This manuscript presents a framework for deobfuscating software which abstracts the input program as much as a mathematical model of its behavior, through monitoring every single operation performed during the malware execution. Also the program is guided to run through its di erent execution paths automatically in order to gather as much knowledge as possible in the shortest time span. This makes it possible to nd hidden logics and deobfuscate di erent obfuscation techniques without being dependent on their speci c details. The resulting model is then recoded as a C program without the arti cially added complexities. This code is called a twincode and behaves in the same manner as the obfuscated binary. As a proof of concept, the proposed framework is implemented and its e ectiveness is evaluated on obfuscated binaries. Program control flow graphs are inspected as a measure of successful code recovery. The performance of the proposed framework is evaluated using the set of SPEC test programs.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 171

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 131 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2013
  • Volume: 

    5
Measures: 
  • Views: 

    106
  • Downloads: 

    85
Abstract: 

NETWORK Virtualization IS AN IMPORTANT CONCEPT TO OVERCOME THE OSSIFICATION OF TODAY’S INTERNET AS IT FACILITATES INNOVATION ALSO IN THE NETWORK CORE AND AS IT PROMISES A MORE EFFICIENT USE OF THE GIVEN RESOURCES AND INFRASTRUCTURE. VIRTUAL NETWORKS (VNETS) PROVIDE AN ABSTRACTION OF THE PHYSICAL NETWORK: MULTIPLE VNETS MAY COHABIT THE SAME PHYSICAL NETWORK, BUT CAN BE BASED ON COMPLETELY DIFFERENT PROTOCOL STACKS (ALSO BEYOND IP). ONE OF THE MAIN CHALLENGES IN NETWORK Virtualization IS THE EFFICIENT ADMISSION CONTROL AND EMBEDDING OF VNETS. THE DEMAND FOR VIRTUAL NETWORKS (E.G., FOR A VIDEO CONFERENCE) CAN BE HARD TO PREDICT, AND ONCE THE REQUEST IS ACCEPTED, THE SPECIFICATION / QOS GUARANTEES MUST BE ENSURED THROUGHOUT THE VNET’S LIFETIME. THIS REQUIRES AN ADMISSION CONTROL ALGORITHM WHICH ONLY SELECTS HIGH-BENEFIT VNETS IN TIMES OF SCARCE RESOURCES, AND AN EMBEDDING ALGORITHM WHICH REALIZES THE VNET IN SUCH A WAY THAT THE LIKELIHOOD THAT FUTURE REQUESTS CAN BE EMBEDDED AS WELL IS MAXIMIZED. IN THIS DOCUMENT, WE SURVEY VARIOUS ALGORITHMS PROPOSED FOR VIRTUAL NETWORKS THAT ARE AVAILABLE. WE HERE TRY NOT TO BE EXHAUSTIVE BUT ANALYZE THE IMPORTANT TECHNIQUES IN THE LITERATURE. PRESENT SURVEY WOULD HELP TO GIVE A NEW DIRECTION TO THE RESEARCH IN THIS REALM.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 106

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 85
Issue Info: 
  • Year: 

    2018
  • Volume: 

    6
  • Issue: 

    1 (21)
  • Pages: 

    1-16
Measures: 
  • Citations: 

    0
  • Views: 

    545
  • Downloads: 

    0
Abstract: 

"The software protection against analysis has become an important issue in the field of computer engineering. The symbolic execution method, as an approach to explore execution paths and conditions of the program, is recently considered. Therefore, developers try to protect their code to prevent against symbolic execution. A successful symbolic execution has extracted the provisions of all paths in the form of a symbolic tree. Therefore, we can prevent the symbolic execution of a program to protect the code in several different ways and hide paths from the view of analysts. This paper focused on obfuscating the condition for behavior so that in the case of symbolic execution analyst can not find the right conditions of a behavior. For this purpose, a new agenda is presented to add some new variables to the execution path that they are related to the program variables to confuse constraint solvers and build many new fake paths in the form of the symbolic tree. Results showed that symbolic analysis tools are unable to obtain all paths after obfuscation.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 545

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    24
  • Issue: 

    63 (مسلسل 95)
  • Pages: 

    111-139
Measures: 
  • Citations: 

    0
  • Views: 

    86
  • Downloads: 

    17
Abstract: 

Using new media is one of the most important cultural issues in everyday life. The expansion and prevalence of instant and continuous communication has rapidly affected various fields of daily life. The permanent presence of virtual technologies in academic environments can hardly be denied. Meanwhile, the university has also lost its previous nature and meaning. This has especially caused a change in the function of universities in relation to the society and other social entities. The purpose of the present study is to investigate the relationship between classroom Virtualization and university culture during Covid-19 Situation. The study has a quantitative paradigm and its research method is a survey. The population of the research consists of 385 students of the state universities of Tehran in three categories of face-to face, semi online and online university courses. Cluster Random Sampling and Probabilistic Sampling in proportion to the number of population have been used. The research model was tested using Lisrel software. The results show that the process of Virtualization has an influence on the communication as an intermediate variable and it thus has a significant effect on the university culture and its dimensions such as lifestyle, organizational culture, etc. In other words, communication is an intermediary that mediates between Virtualization and dimensions of university culture. It can be concluded from the findings that the process of Virtualization has created a fundamental change in human interactions and communication and this transformation in human interactions has also spread to other aspects of university life and culture.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 86

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 17 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2025
  • Volume: 

    17
  • Issue: 

    2
  • Pages: 

    59-74
Measures: 
  • Citations: 

    0
  • Views: 

    4
  • Downloads: 

    0
Abstract: 

In recent years, due to the high availability of documents through the Internet, plagiarism is becoming a serious issue in many fields of research. Moreover, the availability of machine translation systems facilitates the re-use of textual content across languages. So, the detection of plagiarism in cross-lingual cases is now of great importance especially when the source and target language are different. Various methods for automatic detection of text reuse have been developed whose objective is to help human experts investigate suspicious documents for plagiarism cases. For evaluating the performance of theses plagiarism detection systems and algorithms, we need to construct plagiarism detection corpora. In this paper, we propose an English-Persian plagiarism detection corpus comprised of different types of paraphrasing. The goal is to simulate what would be done by humans to conceal plagiarized passages after translating the text into the target language. The proposed corpus includes seven types of paraphrasing methods that cover (but not limited to) all of the obfuscation types in the previous works into one integrated CLPD corpus. To evaluate the corpus, an extrinsic evaluation approach has been applied by executing a wide variety of plagiarism detection algorithms as downstream tasks on the proposed corpus. The results show that the performance of the algorithms decreases by increasing the obfuscation complexity.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 4

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    13
  • Issue: 

    2
  • Pages: 

    157-162
Measures: 
  • Citations: 

    0
  • Views: 

    74
  • Downloads: 

    40
Abstract: 

There are many different ways of securing FPGAs to prevent successful reverse engineering. One of the common forms is obfuscation methods. In this paper, we proposed an approach based on obfuscation to prevent FPGAs from successful reverse engineering and, as a result, hardware trojan horses (HTHs) insertion. Our obfuscation method is using configurable look up tables (CFGLUTs). We suggest to insert CFGLUTs randomly or based on some optional parameters in the design. In this way, some parts of the design are on a secure memory, which contains the bitstream of the CFGLUTs so that the attacker does not have any access to it. We program the CFGLUTs in run-time to complete the bitstream of the FPGA and functionality of the design. If an attacker can reverse engineer the bitstream of the FPGA, he cannot detect the design because some part of it is composed of CFGLUTs, which their bitstream is on a secure memory. The first article uses CFGLUTs for securing FPGAs against HTHs insertion, which are results of reverse engineering. Our methods do not have any power and hardware overhead but 32 clock cycles time overhead.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 74

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 40 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    11
  • Issue: 

    3
  • Pages: 

    131-137
Measures: 
  • Citations: 

    0
  • Views: 

    224
  • Downloads: 

    536
Abstract: 

Data Virtualization (DV) has become an important method to store and handle data cost-efficiently. However, it is unclear what kind of data and when data should be virtualized or not. We applied a design science approach in the first stage to get a state of the art of DV regarding data integration and to present a concept matrix. We extend the knowledge base with a systematic literature review resulting in 15 critical success factors for DV. Practitioners can use these critical success factors to decide between DV and Extract, Transform, Load (ETL) as data integration approach.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 224

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 536 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2018
  • Volume: 

    17
  • Issue: 

    39
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    167
  • Downloads: 

    0
Abstract: 

The study is to rank the indicators that affect the sale of sports products through cyberspace from the perspective of physical education students of Payam-e-Noor University of Tehran. The statistical population included all female and male physical education students of Payam-e-Noor University of Tehran, whose total number was 1302 (635 women and 667 men). According to Morgan table, 302 individuals were selected by cluster and random sampling from south Tehran, Tehran west, Lavasan, Shahriar, Varamin and Pakdasht branches. A researcher-made questionnaire was used to collect data. Its validity was confirmed by 10 sport management experts and its reliability was calculated by Cronbach's alpha (0. 81). To assess the validity of the questionnaire, content validity and confirmatory factor analysis were used. This research is an applied survey and its information was provided on gathering method. In order to investigate the relationship between variables, the correlation between the types of research is measured. For data analysis, one-sample t-test and two samples, ANOVA test, Pearson correlation test, and Friedman test for ranking the factors were used by SPSS20 software. Factors such as the quality of content and website design, the amount of Internet access, the method of receiving goods and how to pay, the speed and ease of using the website, the reliability of the store, the side services and its effective advertising are factors affecting the sales of goods. On the other hand, it was found that the age and education are important factors in the attitude of individuals towards the impact of store promotions on its sales growth.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 167

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    6
  • Issue: 

    2
  • Pages: 

    53-63
Measures: 
  • Citations: 

    0
  • Views: 

    130
  • Downloads: 

    71
Abstract: 

obfuscation, as one invasive strategy, is considered to be a defense strategy in the eld of software and vital information protection against security threats. This paper proposes a new dynamic obfuscation method, called CSE, based on combining a triplet of control ow, signals and encryption of the management table (MT). This triplet exchanges and hides the control graph program. Then, it produces the MT that includes addresses to guide communication between instructions. A type of the stream cipher symmetric encryption (Spritz) applies to encrypt the MT. Also, a multi-objective function (the ability and the resiliency) based on six implementation metrics and two classic objective functions (the cost and the Mishra) are considered to evaluate the proposed obfuscation method. Therefore, the proposed triplet obfuscation method and the multi-objective functions are performed on a small program and a benchmark dataset. The results of our evaluations show that CSE has competitive advantages in comparison with other methods.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 130

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 71 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    8
  • Issue: 

    1
  • Pages: 

    67-77
Measures: 
  • Citations: 

    0
  • Views: 

    1246
  • Downloads: 

    0
Abstract: 

With the increasing rate of cyber-attacks, creating security for cyberspace has become more important and crucial. Therefore computers, computer networks and all current systems connected to the Internet are always at risk of cyber-attacks. In this paper, a novel technique based on alteration technique of attack is proposed by providing a new classification in the methods of obfuscation. In this method, by replacing the attacks that have similar characteristics in the attack strategies the attacker causes an increase in wrong classification and thus reduces the dependence between attack steps. Therefore, by increasing the length of the attack, network security managers cannot easily distinguish cyber-attacks. The proposed model was assessed based on the Bayesian algorithm. The results of the research and implementation of the model indicate that the accuracy of classification (in terms of log) by intrusion detection systems for the best case of clean attacks in the sequel of attack, is-0. 02 and for obfuscation attacks at the action level is-0. 19. For obfuscate attacks with the alternative technique it becomes-3 and for the insertion technique it decreases to-6. 74. In the proposed model, as in the obfuscation-based insertion technique, the corresponding attack method has been used. Due to the difference in the type of ambiguity model, different results are obtained, and the combination of these two obfuscating techniques in cyber-attacks can bring better results to the attacker in deceiving the intrusion detection systems and creating uncertainties in the sequence of observed attacks.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1246

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button