Loading...
Search for: amini--morteza
0.01 seconds
Total 25 records

    Performance Improvement of Android Repackaged Applications

    , M.Sc. Thesis Sharif University of Technology Mijtaba, Moazen (Author) ; Amini, Morteza (Supervisor)
    Abstract
    Attacks on Android devices often take the form of repackaging. Attackers change a well-known app that has been downloaded from the app store, reverse engineer it, add some malicious payloads, and then upload the modified app to the app store. Because it is difficult for users to distinguish between the changed app and the original app, users can be easily duped. The malicious code inside the modified apps can launch attacks after they are installed, typically in the background. There are so many repackage detection method proposed during last years of researches in this area. developing an approach to detect android repackaged application should contains two main goal, speed and accuracy of... 

    Distributed Anomaly Detection on the IoT Edge

    , M.Sc. Thesis Sharif University of Technology Bajand, Mohammad Amin (Author) ; Amini, Morteza (Supervisor)
    Abstract
    With the growing trend of IoT, especially in critical areas like health system and city management, and the expectations of even higher growth with the advent of 5G networks, the security and preserving of users' privacy in IoT has gained significant importance. Anomaly detection is one of the approaches to monitor IoT devices which enables the identification of anomalous behaviors. This anomalous behavior could indicate malware infection, physical malfunctions, or tampering.Deep learning has been a common approach for anomaly detection for the past few years. The solutions are mostly suggested in a special purpose manner and because they are based on a particular deep learning model, they... 

    Digital Currency Scheme with Offline Payment and Financial Crime Combating Law Enforcement

    , M.Sc. Thesis Sharif University of Technology Aghaour, Amir Mohammad (Author) ; Amini, Morteza (Supervisor)
    Abstract
    The security and convenience of digital payment methods have made them an essential part of people's daily lives. As a result, the possibility of using these methods in an offline environment without the need to communicate with the payment service provider is of great importance. To make this possible, a digital currency system should enable users to securely control their assets without the help of an intermediary and act according to established laws to combat financial crimes. Otherwise, this system will not be usable by the public or on a large scale. To solve this problem, a scheme with the possibility of offline payment by customers, prevention and detection of double spending by... 

    Analysis and Countermeasure of Android Malware Generation Using Adversarial Example Generation Methods

    , M.Sc. Thesis Sharif University of Technology Arabzadeh, Mohammad Reza (Author) ; Amini, Morteza (Supervisor)
    Abstract
    The widespread use of the Android operating system has made it an attractive target for attackers. In the field of malware identification and mitigation, the use of machine learning methods has seen significant advancements due to their ability to identify unknown malware. One of these methods is graph-based techniques in constructing malware detection systems, which have achieved high success rates in identifying malware. However, machine learning methods suffer from the vulnerability of being misled by adversarial examples. One important aspect in both malware detection systems and adversarial attacks is the limitations imposed on software modification. Any changes made to the application... 

    Access Control System with Access Delegation in E-Health

    , M.Sc. Thesis Sharif University of Technology Ghofrani, Faegheh (Author) ; Afshin Hemmatyar, Ali Mohammad (Supervisor) ; Amini, Morteza (Supervisor)
    Abstract
    In electronic health, data is stored and retrieved electronically at the local or national level for clinical, educational and administrative purposes. The importance of data from citizens, patients, professionals and providers of healthcare and policy-makers points of view make it a valuable asset. In recent years, we confront the emergence of the Internet of Things and its widespread use in electronic health. In this area, health sensors such as a heart rate sensor, a blood glucose sensor, or a respiratory sensor provide information about each person that can be sent through the network to the physician. Such a continuous remote monitoring allows physicians to take better care of patients...