Loading...
Search for: evaluation-results
0.007 seconds
Total 42 records

    Markhor: malware detection using fuzzy similarity of system call dependency sequences

    , Article Journal of Computer Virology and Hacking Techniques ; 2021 ; 22638733 (ISSN) Lajevardi, A. M ; Parsa, S ; Amiri, M. J ; Sharif University of Technology
    Springer-Verlag Italia s.r.l  2021
    Abstract
    Static malware detection approaches are time-consuming and cannot deal with code obfuscation techniques. Dynamic malware detection approaches, on the other hand, address these two challenges, however, suffer from behavioral ambiguity, such as the system calls obfuscation. In this paper, we introduce Markhor, a dynamic and behavior-based malware detection approach. Markhor uses system call data dependency and system call control dependency sequences to create a weighted list of malicious patterns. The list is then used to determine the malicious processes. Next, the similarity of a file system call sequences to a malicious pattern is extracted based on a fuzzy algorithm and the file nature is... 

    Markhor: malware detection using fuzzy similarity of system call dependency sequences

    , Article Journal of Computer Virology and Hacking Techniques ; Volume 18, Issue 2 , 2022 , Pages 81-90 ; 22638733 (ISSN) Mohammadzade Lajevardi, A ; Parsa, S ; Amiri, M. J ; Sharif University of Technology
    Springer-Verlag Italia s.r.l  2022
    Abstract
    Static malware detection approaches are time-consuming and cannot deal with code obfuscation techniques. Dynamic malware detection approaches, on the other hand, address these two challenges, however, suffer from behavioral ambiguity, such as the system calls obfuscation. In this paper, we introduce Markhor, a dynamic and behavior-based malware detection approach. Markhor uses system call data dependency and system call control dependency sequences to create a weighted list of malicious patterns. The list is then used to determine the malicious processes. Next, the similarity of a file system call sequences to a malicious pattern is extracted based on a fuzzy algorithm and the file nature is... 

    Reconfigurable cluster-based networks-on-chip for application-specific MPSoCs

    , Article Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors ; 9-11 July , 2012 , pp. 153-156 ; ISSN: 10636862 ; ISBN: 9780769547688 Modarressi, M ; Sarbazi-Azad, H ; Sharif University of Technology
    Abstract
    In this paper, we propose a reconfigurable NoC in which a customized topology for a given application can be implemented. In this NoC, the nodes are grouped into some clusters interconnected by a reconfigurable communication infrastructure. The nodes inside a cluster are connected by a fixed topology. From the traffic management perspective, this structure benefits from the interesting characteristics of the mesh topology (efficient handling of local traffic where each node communicates with its neighbors), while avoids its drawbacks (the lack of short paths between remotely located nodes). We then present a design flow that maps the frequently communicating tasks of a given application into... 

    Reconfigurable cluster-based networks-on-chip for application-specific MPSoCs

    , Article 2012 IEEE 23rd International Conference on Application-Specific Systems, Architectures and Processors, ASAP 2012, Delft, 9 July 2012 through 11 July 2012 ; 2012 , Pages 153-156 ; 10636862 (ISSN) ; 9780769547688 (ISBN) Modarressi, M ; Sarbazi Azad, H
    2012
    Abstract
    In this paper, we propose a reconfigurable NoC in which a customized topology for a given application can be implemented. In this NoC, the nodes are grouped into some clusters interconnected by a reconfigurable communication infrastructure. The nodes inside a cluster are connected by a fixed topology. From the traffic management perspective, this structure benefits from the interesting characteristics of the mesh topology (efficient handling of local traffic where each node communicates with its neighbors), while avoids its drawbacks (the lack of short paths between remotely located nodes). We then present a design flow that maps the frequently communicating tasks of a given application into... 

    A novel approach to design reversible counter rotating propeller fans

    , Article ASME 2012 Gas Turbine India Conference, GTINDIA 2012, 1 December 2012 through 1 December 2012 ; December , 2012 , Pages 265-270 ; 9780791845165 (ISBN) Abbaszadeh, M ; Parizi, P. N ; Taheri, R ; Sharif University of Technology
    2012
    Abstract
    Because of their high performance and unique abilities like producing none-rotating wake, Counter Rotating Propellers (C.R.P.) are being used in many advanced propulsion or ventilation systems. But due to complicated design procedure of C.R.P. fans up to now it was not possible to apply the concept in reversible systems. For the first time in this research, a new method presented to design a reversible counter rotating propeller system. This method is based on designing a basic C.R.P. by a reliable edition of blade element theory to achieve maximum performance in main rotating course and then to optimize it in order to have almost same performance in reverse rotating course. After expressing... 

    Using intra-line level pairing for graceful degradation support in PCMs

    , Article Proceedings of IEEE Computer Society Annual Symposium on VLSI, ISVLSI, 8 July 2015 through 10 July 2015 ; Volume 07-10-July-2015 , 2015 , Pages 527-532 ; 21593469 (ISSN) ; 9781479987184 (ISBN) Asadinia, M ; Sarbazi Azad, H ; Sharif University of Technology
    IEEE Computer Society  2015
    Abstract
    In Phase-Change Memory (PCM), the number of writes a cell can take before wearing-out is limited and highly varied due to unbalanced write traffic and process variation. After the failure of weak cells and in presence of large number of failed lines, some techniques have been proposed to further prolong the lifetime of a PCM device by remapping failed lines to spares and salvage a PCM device with graceful degradation. Others rely on handling failures through inter-line pairing. Observations reveal that most of cells in a line are healthy when the line is marked as faulty by any of these proposals. To overcome this deficiency, we propose Intra-line Level Pairing(ILP), a technique that... 

    Symmetry and partial order reduction techniques in model checking Rebeca

    , Article Acta Informatica ; Volume 47, Issue 1 , 2010 , Pages 33-66 ; 00015903 (ISSN) Jaghoori, M.M ; Sirjani, M ; Mousavi, M.R ; Khamespanah, E ; Movaghar, A ; Sharif University of Technology
    2010
    Abstract
    Rebeca is an actor-based language with formal semantics which is suitable for modeling concurrent and distributed systems and protocols. Due to its object model, partial order and symmetry detection and reduction techniques can be efficiently applied to dynamic Rebeca models. We present two approaches for detecting symmetry in Rebeca models: One that detects symmetry in the topology of inter-connections among objects and another one which exploits specific data structures to reflect internal symmetry in the internal structure of an object. The former approach is novel in that it does not require any input from the modeler and can deal with the dynamic changes of topology. This approach is... 

    Efficient processor allocation in a reconfigurable CMP architecture for dark silicon era

    , Article Proceedings of the 34th IEEE International Conference on Computer Design, ICCD 2016, 2 October 2016 through 5 October 2016 ; 2016 , Pages 336-343 ; 9781509051427 (ISBN) Aghaaliakbari, F ; Hoveida, M ; Arjomand, M ; Jalili, M ; Sarbazi Azad, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    The continuance of Moore's law and failure of Dennard scaling force future chip multiprocessors (CMPs) to have considerable dark regions. How to use up available dark resources is an important concern for computer architects. In harmony with these changes, we must revise processor allocation schemes that severely affect the performance of a parallel on-chip system. A suitable allocation algorithm should reduce runtime and increase the power efficiency with proper thermal distribution to avoid hotspots. With this motivation, this paper proposes a power-efficient and high performance general purpose infrastructure for which a Dark Silicon Aware Processor Allocation (DSAPA) scheme is proposed... 

    A multi-dimensional fairness combinatorial double-sided auction model in cloud environment

    , Article 2016 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 672-677 ; 9781509034345 (ISBN) Hassanzadeh, R ; Movaghar, A ; Hassanzadeh, H. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    In cloud investment markets, consumers are looking for the lowest cost and a desirable fairness while providers are looking for strategies to achieve the highest possible profit and return. Most existing models for auction-based resource allocation in cloud environments only consider the overall profit increase and ignore the profit of each participant individually or the difference between the rich and the poor participants. This paper proposes a multi-dimensional fairness combinatorial double auction (MDFCDA) model which strikes a balance between the revenue and the fairness among participants. We solve a winner determination problem (WDP) through integer programming which incorporates the... 

    Coincidence based mapping extraction with genetic algorithms

    , Article 3rd International Conference on Web Information Systems and Technologies, Webist 2007, Barcelona, 3 March 2007 through 6 March 2007 ; Volume WIA , 2007 , Pages 176-183 Qazvinian, V ; Abolhassani, H ; Haeri, S. H ; Sharif University of Technology
    2007
    Abstract
    Ontology Aligning is an answer to the problem of handling heterogenous information on different domains. After application of some measures, one reaches a set of similarity values. The final goal is to extract mappings. Our contribution is to introduce a new genetic algorithm (GA) based extraction method. The GA, employs a structured based weighting model, named "coincidence based model", as its fitness function. In the first part of the paper, some preliminaries and notations are given and then we introduce the coincidence based weighting. In the second part the paper discusses the details of the devised GA with the evaluation results for a sample dataset  

    3D hand pose estimation using RGBD images and hybrid deep learning networks

    , Article Visual Computer ; 2021 ; 01782789 (ISSN) Mofarreh Bonab, M ; Seyedarabi, H ; Mozaffari Tazehkand, B ; Kasaei, S ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2021
    Abstract
    Hand pose estimation is one of the most attractive research areas for image processing. Among the human body parts, hands are particularly important for human–machine interactions. The advent of commercial depth cameras along with the rapid growth of deep learning has made great progress in all image processing fields, especially in hand pose estimation. In this study, using depth data, we introduce two hybrid deep neural networks to estimate 3D hand poses with fewer computations and higher accuracy compared with their counterparts. Due to the fact that the dimensions of data are reduced while passing through successive layers of networks, which causes data to be lost, we use the concept of... 

    Audio-visual speech recognition techniques in augmented reality environments

    , Article Visual Computer ; Vol. 30, issue. 3 , March , 2014 , pp. 245-257 ; ISSN: 01782789 Mirzaei, M. R ; Ghorshi, S ; Mortazavi, M ; Sharif University of Technology
    Abstract
    Many recent studies show that Augmented Reality (AR) and Automatic Speech Recognition (ASR) technologies can be used to help people with disabilities. Many of these studies have been performed only in their specialized field. Audio-Visual Speech Recognition (AVSR) is one of the advances in ASR technology that combines audio, video, and facial expressions to capture a narrator's voice. In this paper, we combine AR and AVSR technologies to make a new system to help deaf and hard-of-hearing people. Our proposed system can take a narrator's speech instantly and convert it into a readable text and show the text directly on an AR display. Therefore, in this system, deaf people can read the... 

    Performability guarantee for periodic tasks in real-time systems

    , Article Scientia Iranica ; Vol. 21, issue. 6 , 2014 , p. 2127-2137 ; 1026-3098 Bashiri, M ; Miremadi, S. G ; Sharif University of Technology
    Abstract
    Performability is an important parameter in safety-critical real-time systems. This parameter is defined as the joint consideration of two other important parameters, i.e., reliability and performance. This paper proposes a schedulability condition that guarantees a desired level of performability under various working conditions for real-time systems. The basic idea underlining this condition is to select a subset of schedulable tasks and manage their slack times to satisfy a desired performability level. The proposed condition is evaluated on a hard real-time system that employs the Rate-Monotonic (RM) scheduling algorithm and uses the re-execution mechanism to improve the reliability.... 

    Noise reduction of speech signal using bayesian state-space Kalman filter

    , Article 2013 19th Asia-Pacific Conference on Communications, APCC 2013 ; August , 2013 , Pages 545-549 ; 9781467360500 (ISBN) Sarafnia, A ; Ghorshi, S ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    The noise exists in almost all environments such as cellular mobile telephone systems. Various types of noise can be introduced such as speech additive noise which is the main factor of degradation in perceived speech quality. At some applications for example at the receiver of a telecommunication system, the direct value of interfering noise is not available and there is just access to noisy speech. In these cases the noise cannot be cancelled totally but it may be possible to reduce the noise in a sensible way by utilizing the statistics of the noise and speech signal. In this paper the proposed method for noise reduction is Bayesian recursive state-space Kalman filter, which is a method... 

    LSB ++: An improvement to LSB + steganography

    , Article IEEE Region 10 Annual International Conference, Proceedings/TENCON, 21 November 2011 through 24 November 2011, Bali ; 2011 , Pages 364-368 ; 9781457702556 (ISBN) Ghazanfari, K ; Ghaemmaghami, S ; Khosravi, S. R ; Sharif University of Technology
    Abstract
    The Least Significant Bit (LSB) substitution is an old and simple data hiding method that could almost effortlessly be implemented in spatial or transform domain over any digital media. This method can be attacked by several steganalysis methods, because it detectably changes statistical and perceptual characteristics of the cover signal. A typical method for steganalysis of the LSB substitution is the histogram attack that attempts to diagnose anomalies in the cover image's histogram. A well-known method to stand the histogram attack is the LSB + steganography that intentionally embeds some extra bits to make the histogram look natural. However, the LSB + method still affects the perceptual... 

    Tomographical medical image reconstruction using Kalman filter technique

    , Article Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011, 26 May 2011 through 28 May 2011 ; May , 2011 , Pages 61-65 ; 9780769544298 (ISBN) Goliaei, S ; Ghorshi, S ; Sharif University of Technology
    2011
    Abstract
    In this paper, a Kalman filter technique which is operated in time is introduced for noise reduction on CT set of projections to reconstruct medical images. The experiments were done on medical image of kidneys and the simulated projections are captured by CT scanner. Evaluation results indicated that as the number of projections increase in the collected ray sums corrupted by noise the quality of reconstructed image becomes better in terms of contrast and transparency. However, for the comparison issue, the same conditions are applied for reconstruction of medical image in frequency domain using filter back projection technique. It observes that filter back projection technique does not... 

    An energy-efficient virtual channel power-gating mechanism for on-chip networks

    , Article Proceedings -Design, Automation and Test in Europe, DATE, 9 March 2015 through 13 March 2015 ; Volume 2015-April , March , 2015 , Pages 1527-1532 ; 15301591 (ISSN) ; 9783981537048 (ISBN) Mirhosseini, A ; Sadrosadati, M ; Fakhrzadehgan, A ; Modarressi, M ; Sarbazi Azad, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Power-gating is a promising method for reducing the leakage power of digital systems. In this paper, we propose a novel power-gating scheme for virtual channels in on-chip networks that uses an adaptive method to dynamically adjust the number of active VCs based on the on-chip traffic characteristics. Since virtual channels are used to provide higher throughput under high traffic loads, our method sets the number of virtual channel at each port selectively based on the workload demand, thereby do not negatively affect performance. Evaluation results show that by using this scheme, about 40% average reduction in static power consumption can be achieved with negligible performance overhead  

    Improving the performance of packet-switched networks-on-chip by SDM-based adaptive shortcut paths

    , Article Integration, the VLSI Journal ; Volume 50 , 2015 , Pages 193-204 ; 01679260 (ISSN) Modarressi, M ; Teimouri, N ; Sarbazi Azad, H ; Sharif University of Technology
    Elsevier  2015
    Abstract
    Abstract Reducing the NoC power is critical for scaling up the number of nodes in future many-core systems. Most NoC designs adopt packet-switching to benefit from its high throughput and excellent scalability. These benefits, however, come at the price of the power consumption and latency overheads of routers. Circuit-switching, on the other hand, enjoys a significant reduction in power and latency of communication by directing data over pre-established circuits, but the relatively large circuit setup time and low resource utilization of this switching mechanism is often prohibitive. In this paper, we address one of the major problems of circuit-switching, i.e. the circuit setup time... 

    LATED: lifetime-aware tag for enduring design

    , Article Proceedings - 2015 11th European Dependable Computing Conference, EDCC 2015, 7 September 2015 through 11 September 2015 ; 2015 , Pages 97-107 ; 9781467392891 (ISBN) Ghaemi, S. G ; Hosseini Monazzah, A. M ; Farbeh, H ; Miremadi, S. G ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Nowadays, leakage energy constitutes up to 80% of total cache energy consumption and tag array is responsible for a considerable fraction of static energy consumption. An approach to reduce static energy consumption is to replace SRAMs by STT-RAMs with near zero leakage power. However, a problem of an STT-RAM cell is its limited write endurance. In spite of previous studies which have targeted the data array, in this study STT-RAMs are used in the L1 tag array. To solve the write endurance problem, this paper proposes an STTRAM/SRAM tag architecture. Considering the spatial locality of memory references, the lower significant bitlines of the tag update more. The SRAM part handles the updates... 

    BLESS: A simple and efficient scheme for prolonging PCM lifetime

    , Article 53rd Annual ACM IEEE Design Automation Conference, DAC 2016, 5 June 2016 through 9 June 2016 ; Volume 05-09 , June-2016 , 2016 ; 0738100X (ISSN); 9781450342360 (ISBN) Asadinia, M ; Jalili, M ; Sarbazi Azad, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Limited endurance problem and low cell reliability are main challenges of phase change memory (PCM) as an alternative to DRAM. To further prolong the lifetime of a PCM device, there exist a number of techniques that can be grouped in two categories: 1) reducing the write rate to PCM cells, and 2) handling cell failures when faults occur. Our experiments confirm that during write operations, an extensive non-uniformity in bit ips is exhibited. To reduce this non-uniformity, we present byte-level shifting scheme (BLESS) which reduces write pressure over hot cells of blocks. Additionally, this shifting mechanism can be used for error recovery purpose by using the MLC capability of PCM and...