Loading...
Search for: yazdizadeh-kharrazi--fatemeh
0.123 seconds

    The Effect of Disruptive Innovations on the Sectoral System of Innovation: A Case Study of VODs in Iran

    , M.Sc. Thesis Sharif University of Technology Yazdizadeh Kharrazi, Fatemeh (Author) ; Miremadi, Iman (Supervisor) ; Honarvar, Rouhollah (Co-Supervisor)
    Abstract
    Video-on-demand platforms are a type of disruptive innovation that has transformed the audiovisual industry by providing users with access to digital video content via the Internet. VOD platforms were introduced in Iran in the Iran, with a focus on analyzing changes in the industry's sectoral innovation system. Data was collected through unstructured interviews with 14 experts in the audiovisual industry, as well as by reviewing relevant documents, news articles, and public data. Thematic analysis was used to code the findings. The results of the research indicate that the emergence and development of VODs have had a significant impact on all aspects of the audiovisual industry's sectoral... 

    Application of Projection Algorithms for Solving Linear Complementarity Problems in Traffic Assignment

    , M.Sc. Thesis Sharif University of Technology Yazdizadeh, Ali (Author) ; Zakaei Aashtiani, Hedayat (Supervisor)
    Abstract
    In recent decades, widespread application of Linear Complementarity Problems in various branches of science has led to many algorithms which have been proposed to solve these problems in the area of mathematics, economics and computer simulation. Ashtiani used Lemke algorithm for the first time to solve Linear Complementarity Problems in his algorithm for solving Traffic Assignment problem. In this study, Projection Gauss-Seidel algorithm along with two other similar algorithms have been studied for solving Linear Complementarity Problems in Ashtiani Complementarity algorithm and the results are compared with Lemke algorithm. Also an analytical method has been proposed for solving specific... 

    ChemInform abstract: microwave-assisted rapid ketalization/acetalization of aromatic aldehydes and ketones in aqueous media [electronic resource]

    , Article Journal of Chemical Research ; September 1999, Volume -, Number 9; Page(s) 562 to 563 Pourdjavadi, A. (Ali) ; Mirjalili, Bibi Fatemeh ; Sharif University of Technology
    Abstract
    Aromatic aldehydes and ketones are readily acetalized or ketalized under microwave irradiation in the presence of water as a solvent  

    Synthesis and characterization of poly(methacrylates) containing spiroacetal and norbornene moieties in side chain [electronic resource]

    , Article Journal of Applied Polymer Science ; Volume 77, Issue 1, pages 30–38, 5 July 2000 Pourdjavadi, A. (Ali) ; Mirjalili, Bibi Fatemeh ; Sharif University of Technology
    Abstract
    A four-step synthetic strategy was applied to achieve novel methacrylic monomers. 5-Norbornene-2,2-dimethanol was prepared from a Diels–Alder reaction of cyclopentadiene and acrolein, followed by the treatment of the adduct with an HCHO/KOH/MeOH solution. The resulting 1,3-diol (1) was then acetalized with different aromatic aldehydes having OH groups on the ring to produce four spiroacetal derivatives. The reaction of methacryloyl chloride with the phenolic derivatives led to four new methacrylic monomers that were identified spectrochemically (mass, FTIR, 1H-NMR, and 13C-NMR spectroscopy). Free radical solution polymerization was used to prepare novel spiroacetal–norbornene containing... 

    Prediction of DNA/RNA Sequence Binding Site to Protein with the Ability to Implement on GPU

    , M.Sc. Thesis Sharif University of Technology Fatemeh Tabatabaei (Author) ; Koohi, Sommaye (Supervisor)
    Abstract
    Based on the importance of DNA/RNA binding proteins in different cellular processes, finding binding sites of them play crucial role in many applications, like designing drug/vaccine, designing protein, and cancer control. Many studies target this issue and try to improve the prediction accuracy with three strategies: complex neural-network structures, various types of inputs, and ML methods to extract input features. But due to the growing volume of sequences, these methods face serious processing challenges. So, this paper presents KDeep, based on CNN-LSTM and the primary form of DNA/RNA sequences as input. As the key feature improving the prediction accuracy, we propose a new encoding... 

    Passive Worm and Malware Detection in Peer-to-Peer Networks

    , M.Sc. Thesis Sharif University of Technology Fahimian, Sahar (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    Due to advantages of Peer-to-Peer (P2P) networks, many internet users use them for content distribution (Many internet users distribute content using them). These systems may be categorized to Centralized, Pure, and Hybrid. Gnutella is a heavily decentralized and unstructured file sharing P2P networks that are responsible for a good part of the traffic on the internet. These P2P networks are at risk of many security threats from internet worms. Internet worms and their threats are a major concern to the networking community. In this thesis we concentrate on passive non-scanning worms and propose a novel approach to detect such worms. As part of our work, we collected data from the Gnutella... 

    Detection of Phishing Websites Using Fast Flux Service Networks

    , M.Sc. Thesis Sharif University of Technology Rohani, Hoda (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    One of the most famous attacks through the internet is the phishing attack. There have been several tools which have been applied in order to discover and confront against this type of attack. Since attackers can change their approaches by spending little cost, they apply methods in order to elude these tools. One of the tricks which has been popular between attackers recently is utilization of Fast-Flux Service Networks. By using these destructive networks, recognition of the main server becomes more complicated. Therefore, the server obtains more accessibility in comparison to the past situation and the life time becomes longer.In this thesis, by collecting data of Sharif server and... 

    A Botnet Detection Technique

    , M.Sc. Thesis Sharif University of Technology Momeni, Behnam (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    A set of infected computers which are coordinated in some manner by one’s willingness and can perform malicious activities and provide threats in the cyberspace forms a network of bots, namely botnet. Botnet threats are more important and significant than other malwares due to their huge scale. A lot of computers coming together in a network obeying one’s commands allows their controller to conduct, for example, DoS attacks larger than ever seen incidents. This thesis, introduces botnets, their various threats, and an effective technique for detecting them. For this reason, different probable states of bots will be studied and modeled as a coherent bot life-cycle. The bot life-cycle allows... 

    Detection and Analysis of Environment-Aware Malwares

    , M.Sc. Thesis Sharif University of Technology Musavi, Atefeh (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    During recent decade huge number of new malware samples and their complexity have caused challenges to malware detection procedure. additionally the use of kernel level rootkit has been grew up. while rootkits usually defeat current security products which are cheifly relied on Operating system for gathering information and also running, existing nti-rootkit solutions can not cover all kinds of rootkits.In this work we have studied the problem of kernel-level rootkits in Windows operating system. we believe that focusing on kernel drivers features, will result in an overall view needs for monitoring kernel activity of the rootkits. Thus with regards to proves for lower volume of obfuscation... 

    Improving Defensive Techniques Against Malwares

    , M.Sc. Thesis Sharif University of Technology Razmi, Fereshteh (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    Advances in computing and networking areas lead to advent of malwares with new and sophisticated features. One of these type of malwares are environment sensitive malwares which behave differently when finding out specific signs in the execution environment. They first was considered and defined in the context of malware analysis systems; meaning that these types of malwares stop their malicious behavior when detecting analysis machine as their execution environment. In this way they could challenge and evade analysis process. Afterwards, the domain of environment sensitive malwares went beyond the analysis systems and covered all environmental sensitivities which hinder the progress of... 

    Distributed Denial of Service Mitigation

    , M.Sc. Thesis Sharif University of Technology Baki, Shahryar (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    Denial of service (DoS) attacks is the main challenges of service providers due to their purpose to makes their service unavaillable. Nowadays this attacks are changed from centralized to distributed (DDoS) by means of botnets. In addition botnets allow attackers to launch attack on higher layers of network, such as application layer. In new application layer DDoS attacks, attacker send HTTP requests to waste victims resources. In addition, attacker can start attack during flash crowd event which makes attack more undetectable. In this research, in order to migigating such attacks, we introduced a method based on user’s history.
    This history consist of user’s request rate for each... 

    Analyzing Permission Abuses in the Android Operating System

    , M.Sc. Thesis Sharif University of Technology Fazli, Zahra (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    Android phones are widely used now. Convenient user interface and various applications for these devices has played a significant role in their success. The wide usage of these devices besides the nature of their applications lead to collect lots of sensitive information on them. Consequently the protection of this information is very important. The unfamiliarity and the inattention of the most of smart phone users to security issues highlight the importance of the data protection and the privacy. The permission access in Android operating system is static and users should permit applications to access the requested permissions on installing them. Also these programs can use their... 

    Improving Android Malware Detection Techniques

    , M.Sc. Thesis Sharif University of Technology Salehi, Majid (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    Widespread growth in popularity of Android apps stimulates malware authors to consider Android-based devices as an atractive target platform. To defend against this severe increase of Android malwares and help users make a beter evaluation of apps, several approaches have been proposed. However, most of them suffer from some shortcomings such as being computationally expensive, not being general, or not being robust enough.According to obfuscation, encryption, and transformation techniques used in malwares, the static detection techniques are not efficient. Another approach is to use dynamic detection techniques, but existing dynamic techniques suffer from lack of atention to semantic... 

    Inferring APIs Correct Usage Rules From Their Source Code

    , M.Sc. Thesis Sharif University of Technology Zolfaghari, Majid (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    Researchers show that one of the critical sources of bugs is API incorrect usage which in some cases can cause serious security vulnerabilities. The lack of knowledge about API correct usage rules is one of the main reasons that APIs are employed incorrectly by programmers, however, nding a correct usage rule for an API is time-consuming and error-prone particularly without having access to API documentation in most cases. Existing approaches to automatically extract correct usage rules, consider the majority usages as the correct rule for an API. Although statistically extracting API correct usage rules can achieve reasonable accuracy, it cannot work correctly in the absence of fair amount... 

    Software De-Obfuscation and its Applications to Malware Analysis

    , Ph.D. Dissertation Sharif University of Technology Momeni, Behnam (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    Obfuscation transformations complicate a software and make it incomprehensible via syntactical changes. This provides high incentive for malware authors to employ different obfuscation techniques. The practical nature of this problem and lack of common definitions in this area have limited the encountering fronts. Whenever a new obfuscation method becomes known in the wild, ad-hoc deobfuscation solutions follow it, trying to recognize it in details and reverse it step by step. As more obfuscation transformations become readily available for malware developers, this approach becomes more costly and impractical. This rises the perceived need for automated deobfuscation. For example, the... 

    Attack Mitigation in Multi-service Web Applications

    , M.Sc. Thesis Sharif University of Technology Shahrokhi, Hooman (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    Defending software against different types of attacks is challenging enough, but for server-side programs it is even harder. The ever-changing nature of technologies used on server-side programs makes it more complex. In this thesis we try to identify these challenges in regard to two specific technologies: multi-service architectures and asynchronous I/O. Then, we present a new framework for running software in asynchronous multi-service architectures with native support for access control rules. Our framework acts as an intermediate between services and can support rules based on the distributed request context that exists between services.
     

    Vulnerability Extraction in Large Codebases Through Template Generalization

    , Ph.D. Dissertation Sharif University of Technology Salimi, Solmaz (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    As the size and complexity of software increase, the number of software vulnerabilities also increases. An examination of vulnerability reports shows that in addition to the fact that a large number of unknown vulnerabilities still exist in software, there is still no proper solution for identifying vulnerabilities that have been observed one sample of them exit in real-world software. The main reason for such an event is the lack of a suitable template for recognized vulnerabilities, which ultimately makes searching for them in other software a problem of scalability and high search cost. This thesis, recognizing the importance of the issue, presents a framework for extracting robust and... 

    Topic Web-based Malware Detection

    , M.Sc. Thesis Sharif University of Technology Monshizadeh, Maliheh (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    Web-based malware is recognized as one of the top-ranked threats in Web. It includes harmful codes or scripts embedded in infected websites which spread in victim’s system while an infected website is visited. These malicious scripts will automatically install malicious programs on victim’s system without user’s knowledge and consent. By taking the control of victim’s system, the attacker can steal sensitive data from the system or uses the computational power of the system in malicious activities like spamming and DoS attacks. Malware authors have started using more advanced techniques like obfuscation to circumvent detection of malicious activities by conventional security tools such as... 

    Analysis of Network Traffic Encrypted at the IP Level

    , M.Sc. Thesis Sharif University of Technology Ghavamnia, Hamed (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    The increasing use of the Internet as the main communications method, has increased the importance of user privacy and the security of their information. Different protocols and different methods have been proposed to provide security, but sometimes they are used to violate the network’s obligations. Increasing the users’ privacy and security, leads to the reduction of the network administrators power to control and manage the network, and this can create vulnerabilities which could be exploited by attackers to violate usage policies. Traffic analysis can be used by administrators to collect information from their network, without having to prohibit the use of security protocols. Different... 

    A Model for Network Telescope on White IP Address Space

    , M.Sc. Thesis Sharif University of Technology Ghasemzadeh, Hamed (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    Network Telescopes are used to extract security features of large a?a?s targeted large net-works.In this method all tra?cs received targeted to an unused address blo? are processedto ?nd useful informations about descriptive parameters of work propagation.Currently all resear?es are focused on dark addresses or unused address blo?s, in this re-sear? the idea is generalized to cover used and white address blo?s. Also the structure ofnetwork telescope is de?ned with a new manner whi?added more details to prediction andestimation methods. To extract security features of a?a?events, a newmethod have been introduced for inferenceabout a?a? parameters. ?e proposed method may be used to predict...