Reza Ebrahimi Atani | University of Guilan (original) (raw)
Papers by Reza Ebrahimi Atani
Communications in Algebra, 2013
We make the general point that over most rings it is impossible to classify all modules: even alg... more We make the general point that over most rings it is impossible to classify all modules: even algebras of tame representation type typically are “wild” when their infinitely generated representations are considered. In particular one is interested in the classification of certain “significant” modules rather than in arbitrary modules; the pure-injective modules seem to form such a class of modules which arise in practice and where there is hope of some kind of classification. Pure-injective modules play a central role in the model theory of modules: for example classification of ...
Zenodo (CERN European Organization for Nuclear Research), Apr 17, 2018
IACR Cryptology ePrint Archive, 2020
Cloud computing and cloud storage are among the most efficient technologies for storing and proce... more Cloud computing and cloud storage are among the most efficient technologies for storing and processing metadata. But there are many privacy concerns within this domain. Most of the challenges are coming from trusted or semi trusted cloud servers where some computations must be applied to high confidential data. Data encryption can solve some confidentiality issues on the cloud but it is not easy to provide privacy preserving data processing services such as searching a query over encrypted data. On the other hand implementing searchable encryption algorithms in cloud infrastructure helps providing data confidentiality and privacy preserving data processing and can provide searching capability as well, which is the most important step of selecting a document. First in this article, some injection attacks against searchable public key encryption schemes are described. To be more specific message injection attack and index injection attack are applied against PEKS and PERKS schemes. Afterwards, two new schemes are proposed that are secure against them and are based of dPEKS and SAE-I. Finally, efficiency and security of proposed schemes are analyzed, and some implementation issues were discussed.
Lecture notes on data engineering and communications technologies, 2020
Nowadays, Internet and web applications have influenced on different aspects of human life. There... more Nowadays, Internet and web applications have influenced on different aspects of human life. Therefore there are always some needs to different software platforms for implementation of electronic commerce or electronic governance. Hence a great market is now devoted to software production in various platforms. Regarding such market demand, producing high-quality softwares with reliability, safety and availability services are considered as an important issue. To be more specific all software companies use software testing concepts as an independent process in software development cycle. There are various methods for software testing, but mutation testing is one of the most powerful tools. In mutation testing, high-quality test-case generation plays a key role and it has a direct relation with quality of software testing. There are different techniques for test-case generation where evolutionary algorithms are among the most common ones. Since each evolutionary algorithm needs an appropriate fitness function which is dependent on target problem, it is very important to know that for each evolutionary algorithm which fitness function generates better test cases. The main goal of this paper is to answer this question and a treatment of five evolutionary algorithms regarding four different fitness functions are classified in this work.
International Conference on Future Generation Communication and Networking, Apr 1, 2013
In this paper we focus on physical attacks on sensor nodes in a wireless sensor networks. Node ca... more In this paper we focus on physical attacks on sensor nodes in a wireless sensor networks. Node capture attacks is one of the most dangerous attacks applied to WSNs which aims to capture a node in the network and try to steal some secret information. To be more specific we first survey node capture attacks and then a novel security mechanism to deal with these types of attacks will be presented. For this purpose a key management protocol is proposed based on authentication and data encryption preventing from node capture attacks. The key of protocol is generated by embedded PUF on sensor nodes chip. This key is unique and all tasks in protocol performed by this key and its products. The proposed solution is resistant against node capture attacks and is efficient in points of the cost and memory size.
Due to the importance of speech signals in the recent years, many techniques have been proposed t... more Due to the importance of speech signals in the recent years, many techniques have been proposed to solve the permutation ambiguity of blind source separation in frequency domain. Our goal in this paper is to present a new method based on initialization and navigation resources to solve the permutation ambiguity in blind source separation in the frequency domain. In this
The manufacturing of integrated circuits (IC) outside of the design houses makes it possible for ... more The manufacturing of integrated circuits (IC) outside of the design houses makes it possible for the adversary to easily perform a reverse engineering attack against intellectual property (IP)/IC. The aim of this attack can be the IP piracy, overproduction, counterfeiting or inserting hardware Trojan (HT) throughout the supply chain of the IC. Preventing hardware Trojan insertion is a significant issue in the context of hardware security (HS) and has not been considered in most of the previous logic encryption methods. To eliminate this problem, in this paper an Anti-Trojan insertion algorithm is presented. The idea is based on the fact that reducing the signals with low-observability (LO) and low-controllability (LC) can prevent HT insertion significantly. The security of logic encryption methods depends on the algorithm and the encryption key. However, the security of these methods has been compromised by SAT attacks over recent years. SAT attacks, can decode the correct key from most logic encryption techniques. In this article, by using the PUF-based encryption, the applied key in the encryption is randomized and SAT attack cannot be performed. Based on the output of PUF, a unique encryption has been made for each chip that preventing from counterfeiting and IP piracy.
IACR Cryptology ePrint Archive, 2013
arXiv (Cornell University), Jan 29, 2019
IACR Cryptology ePrint Archive, 2020
The outsourcing of integrated circuits (IC) makes some of the vulnerabilities and enable the adve... more The outsourcing of integrated circuits (IC) makes some of the vulnerabilities and enable the adversary to reverse engineering attack, IP piracy, overproduction, counterfeiting or hardware Trojan (HT) insertion throughout the supply chain of the IC. The attacker by inserting the hardware Trojan can destroy normal operation in IC, or steal sensitive information from the design. Nowadays the prevention of IP piracy and HT insertion is an important issue in hardware security. Logic encryption as part of Design for Hardware Trust (DFHT) techniques, applies key-gates in order to encrypt the logic of the chip. Therefore if the key inputs are correct the chip has normal function otherwise function is wrong, this work prevention of IP piracy. Furthermore, in some cases of logic encryption techniques, the rare signals that are a good place for insert an HT can be reduced. Therefore, if the HT is inserted in the chip by functional tests can be detected. In this article, a new key-gate that has a double-function is designed to prevent HT insertion as well as preventing from IP piracy. In this paper, by reducing the rare signals and reducing the signals with low observability, prevent HT insertion also, this type of key-gates is resistant to reverse engineering more than the previously designed key-gates. This key-gates has overhead less than insertion based method with XOR and XNOR key-gates.
International Journal of Applied Operational Research - An Open Access Journal, Jan 15, 2013
In this paper, we propose a new concurrency control algorithm based on multi-agent systems which ... more In this paper, we propose a new concurrency control algorithm based on multi-agent systems which is an extension of majority protocol. Then, we suggest a clustering approach to get better results in reliability, decreasing message passing and algorithm's runtime. Here, we consider n different transactions working on non-conflict data items. Considering execution efficiency of some different transactions simultaneously is one of our algorithm features. For evaluating performance of the proposed algorithm we applied it using the MPICH2 mechanism.
Outsourcing information on the cloud server is a method to reduce the computational and storage o... more Outsourcing information on the cloud server is a method to reduce the computational and storage overhead resulted from data owners' huge amount of information. Considering the fact that this information could be sensitive, encryption is used before outsourcing. But this prevents efficient searching. Searchable encryption is an approach that provides security alongside efficiency. So far, many searchable encryption schemes have been presented in which the server is modeled as an honest but curious entity. But in case the server is malicious, the accuracy of the information will be at stake. For this purpose, we propose a multi-server searchable symmetric encryption scheme without the need to trust the cloud servers, using blockchain and smart contract, which works efficiently in addition to ensuring the accuracy of information. Moreover, this scheme involves a fair mechanism to preserve the interests of users and servers and prevent their malicious actions.
Ecology of Iranian Forests
Computation of tree biomass, leads to a clear understanding of production potential of natural an... more Computation of tree biomass, leads to a clear understanding of production potential of natural and artificial forest habitats. Measuring the biomass of trees is possible by direct-cutting and estimation methods. The present study was performed to evaluate the accuracy of allometric equations in estimation of poplar (Populus alba L.) biomass in Koran village of Chaharmahal and Bakhtiari province. For this purpose, 30 number of trees in the study area were randomly selected and their quantitative characteristics including diameter and height of trees were measured and recorded. Then, the biomass of selected trees was calculated by using allometric power equations and applying a diameter at breast height. Then, all selected trees were cut down, sectioned, weighted and sampled and by deducting the percentage of moisture calculated for the samples and extending it to the whole of each section, the biomass of the different organs of the trees was calculated and the results of the cutting method were compared with the estimated biomass of the allometric equations. The results of paired samples t-test showed that the highest biomass of the trees belonged to trunk, branch, twigs and leaf, respectively. Also, results of comparing the two methods showed that there were no significant differences between two methods in calculating the trunk biomass (P 0.387), shoots (P 0.093) and leaves (P 0.082). But for branch biomass, there was a significant difference between the two methods (P: 0.007). The results of this study showed that allometric equations have high accuracy (90%) in estimating the biomass of poplar trees and can be used in related studies instead of destructive and costly cutting off method.
2020 28th Iranian Conference on Electrical Engineering (ICEE), 2020
The outsourcing of integrated circuits (IC) makes some of the vulnerabilities and enable the adve... more The outsourcing of integrated circuits (IC) makes some of the vulnerabilities and enable the adversary to reverse engineering attack, IP piracy, overproduction, counterfeiting or hardware Trojan (HT) insertion throughout the supply chain of the IC. The attacker by inserting the hardware Trojan can destroy normal operation in IC, or steal sensitive information from the design. Nowadays the prevention of IP piracy and HT insertion is an important issue in hardware security. Logic encryption as part of Design for Hardware Trust (DFHT) techniques, applies key-gates in order to encrypt the logic of the chip. Therefore if the key inputs are correct the chip has normal function otherwise function is wrong, this work prevention of IP piracy. Furthermore, in some cases of logic encryption techniques, the rare signals that are a good place for insert an HT can be reduced. Therefore, if the HT is inserted in the chip by functional tests can be detected. In this article, a new key-gate that has a double-function is designed to prevent HT insertion as well as preventing from IP piracy. In this paper, by reducing the rare signals and reducing the signals with low observability, prevent HT insertion also, this type of key-gates is resistant to reverse engineering more than the previously designed key-gates. This key-gates has overhead less than insertion based method with XOR and XNOR key-gates.
The Spurt is led to increasing the workload for software engineers in context of producing reliab... more The Spurt is led to increasing the workload for software engineers in context of producing reliable software. Given the importance of producing high quality software, software engineers created an independent process in cycle of software development that called Software Testing. One of the software testing methods that a lot of researches have been done on it is Mutation Testing. Most of the researches include reducing costs of mutant production and using it in various environments (such as security, web, etc.). What is observed as a gap is little attention to the importance of optimized test case generation in Mutation Testing. The paper intends to show importance of test case generation through a comprehensive review and comparison of conducted researches and prepares a road map for researchers who are interested in the field
First, we give complete description of the comultiplication modules over a Dedekind domain. Secon... more First, we give complete description of the comultiplication modules over a Dedekind domain. Second, if R is the pullback of two local Dedekind domains, then we classify all indecomposable comultiplication R-modules and establish a connection between the comultiplication modules and the pure-injective modules over such domains.
Communications in Algebra, 2013
We make the general point that over most rings it is impossible to classify all modules: even alg... more We make the general point that over most rings it is impossible to classify all modules: even algebras of tame representation type typically are “wild” when their infinitely generated representations are considered. In particular one is interested in the classification of certain “significant” modules rather than in arbitrary modules; the pure-injective modules seem to form such a class of modules which arise in practice and where there is hope of some kind of classification. Pure-injective modules play a central role in the model theory of modules: for example classification of ...
Zenodo (CERN European Organization for Nuclear Research), Apr 17, 2018
IACR Cryptology ePrint Archive, 2020
Cloud computing and cloud storage are among the most efficient technologies for storing and proce... more Cloud computing and cloud storage are among the most efficient technologies for storing and processing metadata. But there are many privacy concerns within this domain. Most of the challenges are coming from trusted or semi trusted cloud servers where some computations must be applied to high confidential data. Data encryption can solve some confidentiality issues on the cloud but it is not easy to provide privacy preserving data processing services such as searching a query over encrypted data. On the other hand implementing searchable encryption algorithms in cloud infrastructure helps providing data confidentiality and privacy preserving data processing and can provide searching capability as well, which is the most important step of selecting a document. First in this article, some injection attacks against searchable public key encryption schemes are described. To be more specific message injection attack and index injection attack are applied against PEKS and PERKS schemes. Afterwards, two new schemes are proposed that are secure against them and are based of dPEKS and SAE-I. Finally, efficiency and security of proposed schemes are analyzed, and some implementation issues were discussed.
Lecture notes on data engineering and communications technologies, 2020
Nowadays, Internet and web applications have influenced on different aspects of human life. There... more Nowadays, Internet and web applications have influenced on different aspects of human life. Therefore there are always some needs to different software platforms for implementation of electronic commerce or electronic governance. Hence a great market is now devoted to software production in various platforms. Regarding such market demand, producing high-quality softwares with reliability, safety and availability services are considered as an important issue. To be more specific all software companies use software testing concepts as an independent process in software development cycle. There are various methods for software testing, but mutation testing is one of the most powerful tools. In mutation testing, high-quality test-case generation plays a key role and it has a direct relation with quality of software testing. There are different techniques for test-case generation where evolutionary algorithms are among the most common ones. Since each evolutionary algorithm needs an appropriate fitness function which is dependent on target problem, it is very important to know that for each evolutionary algorithm which fitness function generates better test cases. The main goal of this paper is to answer this question and a treatment of five evolutionary algorithms regarding four different fitness functions are classified in this work.
International Conference on Future Generation Communication and Networking, Apr 1, 2013
In this paper we focus on physical attacks on sensor nodes in a wireless sensor networks. Node ca... more In this paper we focus on physical attacks on sensor nodes in a wireless sensor networks. Node capture attacks is one of the most dangerous attacks applied to WSNs which aims to capture a node in the network and try to steal some secret information. To be more specific we first survey node capture attacks and then a novel security mechanism to deal with these types of attacks will be presented. For this purpose a key management protocol is proposed based on authentication and data encryption preventing from node capture attacks. The key of protocol is generated by embedded PUF on sensor nodes chip. This key is unique and all tasks in protocol performed by this key and its products. The proposed solution is resistant against node capture attacks and is efficient in points of the cost and memory size.
Due to the importance of speech signals in the recent years, many techniques have been proposed t... more Due to the importance of speech signals in the recent years, many techniques have been proposed to solve the permutation ambiguity of blind source separation in frequency domain. Our goal in this paper is to present a new method based on initialization and navigation resources to solve the permutation ambiguity in blind source separation in the frequency domain. In this
The manufacturing of integrated circuits (IC) outside of the design houses makes it possible for ... more The manufacturing of integrated circuits (IC) outside of the design houses makes it possible for the adversary to easily perform a reverse engineering attack against intellectual property (IP)/IC. The aim of this attack can be the IP piracy, overproduction, counterfeiting or inserting hardware Trojan (HT) throughout the supply chain of the IC. Preventing hardware Trojan insertion is a significant issue in the context of hardware security (HS) and has not been considered in most of the previous logic encryption methods. To eliminate this problem, in this paper an Anti-Trojan insertion algorithm is presented. The idea is based on the fact that reducing the signals with low-observability (LO) and low-controllability (LC) can prevent HT insertion significantly. The security of logic encryption methods depends on the algorithm and the encryption key. However, the security of these methods has been compromised by SAT attacks over recent years. SAT attacks, can decode the correct key from most logic encryption techniques. In this article, by using the PUF-based encryption, the applied key in the encryption is randomized and SAT attack cannot be performed. Based on the output of PUF, a unique encryption has been made for each chip that preventing from counterfeiting and IP piracy.
IACR Cryptology ePrint Archive, 2013
arXiv (Cornell University), Jan 29, 2019
IACR Cryptology ePrint Archive, 2020
The outsourcing of integrated circuits (IC) makes some of the vulnerabilities and enable the adve... more The outsourcing of integrated circuits (IC) makes some of the vulnerabilities and enable the adversary to reverse engineering attack, IP piracy, overproduction, counterfeiting or hardware Trojan (HT) insertion throughout the supply chain of the IC. The attacker by inserting the hardware Trojan can destroy normal operation in IC, or steal sensitive information from the design. Nowadays the prevention of IP piracy and HT insertion is an important issue in hardware security. Logic encryption as part of Design for Hardware Trust (DFHT) techniques, applies key-gates in order to encrypt the logic of the chip. Therefore if the key inputs are correct the chip has normal function otherwise function is wrong, this work prevention of IP piracy. Furthermore, in some cases of logic encryption techniques, the rare signals that are a good place for insert an HT can be reduced. Therefore, if the HT is inserted in the chip by functional tests can be detected. In this article, a new key-gate that has a double-function is designed to prevent HT insertion as well as preventing from IP piracy. In this paper, by reducing the rare signals and reducing the signals with low observability, prevent HT insertion also, this type of key-gates is resistant to reverse engineering more than the previously designed key-gates. This key-gates has overhead less than insertion based method with XOR and XNOR key-gates.
International Journal of Applied Operational Research - An Open Access Journal, Jan 15, 2013
In this paper, we propose a new concurrency control algorithm based on multi-agent systems which ... more In this paper, we propose a new concurrency control algorithm based on multi-agent systems which is an extension of majority protocol. Then, we suggest a clustering approach to get better results in reliability, decreasing message passing and algorithm's runtime. Here, we consider n different transactions working on non-conflict data items. Considering execution efficiency of some different transactions simultaneously is one of our algorithm features. For evaluating performance of the proposed algorithm we applied it using the MPICH2 mechanism.
Outsourcing information on the cloud server is a method to reduce the computational and storage o... more Outsourcing information on the cloud server is a method to reduce the computational and storage overhead resulted from data owners' huge amount of information. Considering the fact that this information could be sensitive, encryption is used before outsourcing. But this prevents efficient searching. Searchable encryption is an approach that provides security alongside efficiency. So far, many searchable encryption schemes have been presented in which the server is modeled as an honest but curious entity. But in case the server is malicious, the accuracy of the information will be at stake. For this purpose, we propose a multi-server searchable symmetric encryption scheme without the need to trust the cloud servers, using blockchain and smart contract, which works efficiently in addition to ensuring the accuracy of information. Moreover, this scheme involves a fair mechanism to preserve the interests of users and servers and prevent their malicious actions.
Ecology of Iranian Forests
Computation of tree biomass, leads to a clear understanding of production potential of natural an... more Computation of tree biomass, leads to a clear understanding of production potential of natural and artificial forest habitats. Measuring the biomass of trees is possible by direct-cutting and estimation methods. The present study was performed to evaluate the accuracy of allometric equations in estimation of poplar (Populus alba L.) biomass in Koran village of Chaharmahal and Bakhtiari province. For this purpose, 30 number of trees in the study area were randomly selected and their quantitative characteristics including diameter and height of trees were measured and recorded. Then, the biomass of selected trees was calculated by using allometric power equations and applying a diameter at breast height. Then, all selected trees were cut down, sectioned, weighted and sampled and by deducting the percentage of moisture calculated for the samples and extending it to the whole of each section, the biomass of the different organs of the trees was calculated and the results of the cutting method were compared with the estimated biomass of the allometric equations. The results of paired samples t-test showed that the highest biomass of the trees belonged to trunk, branch, twigs and leaf, respectively. Also, results of comparing the two methods showed that there were no significant differences between two methods in calculating the trunk biomass (P 0.387), shoots (P 0.093) and leaves (P 0.082). But for branch biomass, there was a significant difference between the two methods (P: 0.007). The results of this study showed that allometric equations have high accuracy (90%) in estimating the biomass of poplar trees and can be used in related studies instead of destructive and costly cutting off method.
2020 28th Iranian Conference on Electrical Engineering (ICEE), 2020
The outsourcing of integrated circuits (IC) makes some of the vulnerabilities and enable the adve... more The outsourcing of integrated circuits (IC) makes some of the vulnerabilities and enable the adversary to reverse engineering attack, IP piracy, overproduction, counterfeiting or hardware Trojan (HT) insertion throughout the supply chain of the IC. The attacker by inserting the hardware Trojan can destroy normal operation in IC, or steal sensitive information from the design. Nowadays the prevention of IP piracy and HT insertion is an important issue in hardware security. Logic encryption as part of Design for Hardware Trust (DFHT) techniques, applies key-gates in order to encrypt the logic of the chip. Therefore if the key inputs are correct the chip has normal function otherwise function is wrong, this work prevention of IP piracy. Furthermore, in some cases of logic encryption techniques, the rare signals that are a good place for insert an HT can be reduced. Therefore, if the HT is inserted in the chip by functional tests can be detected. In this article, a new key-gate that has a double-function is designed to prevent HT insertion as well as preventing from IP piracy. In this paper, by reducing the rare signals and reducing the signals with low observability, prevent HT insertion also, this type of key-gates is resistant to reverse engineering more than the previously designed key-gates. This key-gates has overhead less than insertion based method with XOR and XNOR key-gates.
The Spurt is led to increasing the workload for software engineers in context of producing reliab... more The Spurt is led to increasing the workload for software engineers in context of producing reliable software. Given the importance of producing high quality software, software engineers created an independent process in cycle of software development that called Software Testing. One of the software testing methods that a lot of researches have been done on it is Mutation Testing. Most of the researches include reducing costs of mutant production and using it in various environments (such as security, web, etc.). What is observed as a gap is little attention to the importance of optimized test case generation in Mutation Testing. The paper intends to show importance of test case generation through a comprehensive review and comparison of conducted researches and prepares a road map for researchers who are interested in the field
First, we give complete description of the comultiplication modules over a Dedekind domain. Secon... more First, we give complete description of the comultiplication modules over a Dedekind domain. Second, if R is the pullback of two local Dedekind domains, then we classify all indecomposable comultiplication R-modules and establish a connection between the comultiplication modules and the pure-injective modules over such domains.
Anonymous communication systems (ACS) offer privacy and anonymity through the Internet. They are ... more Anonymous communication systems (ACS) offer privacy and anonymity through the Internet. They are mostly free tools and are popular among users all over the world. In the recent years, anonymity applications faced many problems regarding traffic engineering methods. Even though they ensure privacy under some conditions, their anonymity will be endangered by high performance processing units. To address these issues, this study is devoted to investigating traffic-engineering methods in anonymous communication systems, and proposes an analytical view of the current issues in ACS privacy and anonymity. Our study also indicates new types of solutions for these current issues with ACS.
In proceeding of 7th International Symposium on Telecommunications (IST2014), Sep 2014
in this paper, the main idea is to establish IoT structure for ubiquitous communications. This st... more in this paper, the main idea is to establish IoT structure for ubiquitous communications. This structure has been made by data type modelling. Type modeling is useful to construct homogeneous computational pattern. A design cycle has been introduced here. This cycle is a wizard to cluster and insert computational nodes. For IoT intentions, data that should be transmitted to the higher protocol layer, must be processed at first. So computational nodes are responsible for these in-network computations. The problem is response time and time wasting. The experimental results show that this problem can be eliminated by limited case scenario. The amount of transmitted data has been restricted by a higher bound. This type model is efficient and also reliable for ubiquitous communications. The result says that the same resources can be responsible for new computational demands according to the same type operations. In this way computational nodes can be accessible for all nodes.
Encrypted data cannot ensure full immunity especially in anonymous applications, Even though it p... more Encrypted data cannot ensure full immunity especially in anonymous applications, Even though it protect data by encryption methods. On the other side, we encounter with a set of huge processing units that can reveal data pattern through Internet frameworks. Although intruders are not able to break encrypted layers of data, still they can concentrate on the nature of the transmitted data. In the other hand, set of sent packages that have the same features, have been considered as a victim. As an example of this vulnerability, anonymous applications like Tor can be detected by their data pattern. In this paper an anti-detection mechanism has been proposed. This framework uses a crypto-type system for data pattern generation. Also a stochastic algorithm is responsible for timely propagation of the data. The entire system has been performed on an anonymous data pattern that is responsible for data exchange through the Internet. The results indicate that detection of the suggested pattern is very hard and with a high assurance, it can be applicable through Internet framework. The cryptographic type system has been formed under lattice-based quantum resistant techniques. It is highly recommended for anonymous applications and online private data exchange like e-banking.