Hakem Beitollahi

Hakem Beitollahi
  • Doctor of Philosophy
  • Head of hardware branch at Iran University of Science and Technology

About

84
Publications
14,348
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
802
Citations
Introduction
Current institution
Iran University of Science and Technology
Current position
  • Head of hardware branch

Publications

Publications (84)
Article
Full-text available
The recognition of the same faces masked and unmasked is a paramount function in preserving consistent recognition in public security, safety, and access control. Facial recognition technologies have been seriously tested with the widespread use of masks due to infectious diseases in recent years, which cover key facial areas and reduce identificat...
Article
Full-text available
In mixed‐criticality (MC) systems, tasks with varying criticality levels share resources, leading to challenges in resource management during mode transitions. Existing approaches often result in suboptimal performance due to resource contention and criticality level inheritance. This paper introduces a novel learner‐based resource management strat...
Article
Full-text available
Intrusion detection in modern network environments poses significant challenges due to the increasing volume and complexity of cyber-attacks. This study proposes a hybrid approach integrating density-based clustering with deep learning to identify malicious traffic over the network. The proposed framework consists of two steps: clustering and class...
Article
Full-text available
Physical Unclonable Functions (PUFs) are vulnerable to machine learning modeling attacks that can predict their responses. To counter this threat, we introduce Obfuscated PUF (OPUF), a novel PUF design that employs advanced obfuscation techniques to enhance security. OPUF significantly outperforms existing PUFs in terms of resistance to machine lea...
Preprint
Full-text available
Recognizing the same faces with and without masks is important for ensuring consistent identification in security, access control, and public safety. This capability is crucial in scenarios like law enforcement, healthcare, and surveillance, where accurate recognition must be maintained despite facial occlusion. This research focuses on the challen...
Preprint
Full-text available
In today's digital age, information systems (IS) are indispensable tools for organizations of all sizes. The quality of these systems, encompassing system, information, and service dimensions, significantly impacts organizational performance. This study investigates the intricate relationships between these three quality dimensions and their collec...
Article
Most real-time systems are embedded in portable, battery-powered devices that have strict limitations on power consumption. Safety-critical embedded systems, in particular, demand a high level of reliability. To effectively enhance both reliability and power consumption, it is crucial to consider both criteria with an accurate and stable model. Exi...
Article
In recent years, hardware sorters have been an attracted topic for researchers. Since hardware sorters play a crucial role in embedded systems, several attempts have been made to efficiently design and implement these sorters. Previous state-of-the-art hardware sorters are not suitable for embedded edge computing devices because they (1) consume hi...
Article
Full-text available
Emerging cellular networks integrate diverse technologies like millimeter wave (mmWave) to deliver high capacity but face challenges like blockage sensitivity. Dual connections (DC) enhance throughput but ensuring information freshness (Age-of-Information, AoI) is crucial for real-time applications. This paper proposes a novel approach for AoI opti...
Article
Full-text available
Today, vehicular communication can significantly improve traffic safety and road efficiency and as well as reduce the environmental pollution. The internet of vehicles (IoV) provides a communication platform between vehicles in intercity roads and streets of a city. Various messages such as safety messages and road traffic services can be transferr...
Article
Full-text available
The proliferation of Internet of Vehicles (IoV) has revolutionized transportation systems. However, ensuring secure and privacy-preserving communication in IoV networks remains a challenge. Existing authentication protocols often compromise privacy, incur high computation costs, or are vulnerable to DDoS attacks. To address these limitations, we pr...
Article
Full-text available
Convolutional Neural Network (CNN) is used in many real-world applications due to its high accuracy. The rapid growth of modern applications based on learning algorithms has increased the importance of efficient implementation of CNNs. The array-type architecture is a well-known platform for the efficient implementation of CNN models, which takes a...
Conference Paper
Full-text available
In designing many systems, fault tolerance is a critical requirement for decreasing the effects of the transient faults; in this regard, a Triple Modular Redundancy (TMR) is a highlighted technique. The voter is an essential component of TMR. As the effects of the faults mask in a bit-by-bit voter, some multiple transient faults are not tolerated....
Article
Full-text available
Distributed Denial of Service (DDoS) attacks are a growing threat to online services, and various methods have been developed to detect them. However, past research has mainly focused on identifying attack patterns and types, without specifically addressing the role of freely available DDoS attack tools in the escalation of these attacks. This stud...
Article
Aging mechanisms in FPGA devices cause performance degradation and lead to lifetime reduction. Among multiple aging mechanisms, Biased-Temperature-Instability (BTI) aging mechanism is the dominant one. BTI decreases the Static-Noise-Margin (SNM) of SRAM cells leading to more Soft-Error-Rate (SER) and lower SRAMs’ stability in FPGAs. This paper prop...
Article
Full-text available
Online social media (OSM) generates a massive amount of data about human behavior based on their interactions. People express their opinions, comments and share information about variety of topics of their daily life through OSM. The majority of the comments are divided into three categories: Positive, negative, and natural. Regarding the negative...
Article
In this paper, we propose an online security-aware hardware scheduler, the so-called Secure And Fast hardware Scheduler (SAFAS), for real-time task scheduling in multi-core systems in the presence of schedule-based side-channel attacks. To avoid such attacks and ensure that all tasks meet their deadlines, SAFAS schedules critical tasks and their re...
Article
Full-text available
Data uncertainty can be generated for a variety of reasons, including measurement error, sampling error, environmental monitoring, sensor networks, and medical diagnostics. The process of mining information from emerging applications such as sensors or location-based services should be handled carefully to prevent erroneous outcomes. Several heuris...
Article
Full-text available
Convolutional neural networks (CNNs) are widely used in machine learning (ML) applications such as image processing. CNN requires heavy computations to provide significant accuracy for many ML tasks. Therefore, the efficient implementations of CNNs to improve performance using limited resources without accuracy reduction is a challenge for ML syste...
Article
Full-text available
Reducing energy consumption under processors' temperature constraints has recently become a pressing issue in real‐time multiprocessor systems on chips (MPSoCs). The high temperature of processors affects the power and reliability of the MPSoC. Low energy consumption is necessary for real‐time embedded systems, as most of them are portable devices....
Article
Convolutional neural networks (CNNs) have been widely deployed in artificial intelligence, including computer vision and pattern recognition. In these applications, CNN is the most computationally intensive part. Recently, many researchers have used depthwise convolution to decrease the computational load in the execution of CNNs; on the other hand...
Article
Full-text available
Reliability and energy efficiency are two hostile objectives considered in designing task scheduling in most real-time multiprocessor systems on chip (MPSoC). Addressing and improving one of them may affect and degrade the efficiency of the other one and vice versa. In this paper, we intend to examine these challenges and ultimately achieve an opti...
Article
Reliability and energy efficiency are two hostile objectives considered in designing task scheduling in most real-time multiprocessor systems on chip (MPSoC). Addressing and improving one of them may affect and degrade the efficiency of the other one and vice versa. In this paper, we intend to examine these challenges and ultimately achieve an opti...
Article
Full-text available
Speech is the most common and primary mode of communication among human being. The communication between humans and machines is referred to as the human-computer interface. With the progress of technology, speech signal processing and recognition would be an important topic for many technicians and experts in different domains. Nowadays, speech pro...
Article
Spin Transfer Torque Magnetic RAM (STT-MRAM) is one of the most promising on-chip technologies, which delivers high density, non-volatility, and near-zero leakage power. However, STT-MRAM suffers from three reliability issues, namely, read disturbance, write failure, and retention failure, that present significant challenges to its use as a reliabl...
Article
Full-text available
In an application-layer distributed denial of service (App-DDoS) attack, zombie computers bring down the victim server with valid requests. Intrusion detection systems (IDS) cannot identify these requests since they have legal forms of standard TCP connections. Researchers have suggested several techniques for detecting App-DDoS traffic. There is,...
Conference Paper
This paper proposes an efficient hardware scheduler for scheduling dependent tasks in real-time many-core systems. The main idea behind the proposed scheduler is that the operating system selects tasks that can be scheduled with the Earliest Deadline First (EDF) algorithm and groups the related tasks according to their dependency. It then transfers...
Article
Sorting is an inseparable part of applications that process massive amounts of data. A hardware-designed sorter increases the performance at the cost of increasing the required resources, the issue that is limited in the FPGA chips. This paper proposes a new Ultra-Low-Power 3-dimensional hardware sorting architecture, the so-called ULPSorter, based...
Article
Coarse-grained reconfigurable arrays (CGRAs) are used as low-power and high-performance accelerators in the processors of the Internet of Things (IoT) and embedded systems to accelerate the computation of intensive tasks. These accelerators speedup loops, including integer and fixed-point instructions of computation-intensive applications, in multi...
Article
The multi-layer structure of three-dimensional Network-on-Chips (3D NoC) leads to the unequal thermal conductance between different layers and, as a result, an unbalanced thermal distribution in the chip. This issue leads to the low reliability and performance degradation of 3D NoCs. To ensure thermal safety, 3D NoCs require effective cooling metho...
Article
Full-text available
Soft errors have always been a concern in the design of digital circuits. As technology down-scales toward Nanometer sizes, emergence of aging effects, process variations, and Multiple Event Transients (METs) has made the soft error rate (SER) estimation of digital circuits very challenging. This paper intends to characterize the challenges by inve...
Article
Full-text available
Detecting Hardware Trojans (HTs) in digital circuits might be a challenging problem due to the stealthy nature of these malicious unwanted guests. The trigger part which is supposed to activate the Trojan under exceptional conditions, is often inserted at rare–switched nets of the design to hide them from usual verification tests mechanisms. Existi...
Article
Full-text available
This paper represents an on-line time-predictable distributed hardware scheduler solution, suitable for many-core systems. We have partitioned the Main scheduler into uniform Partial schedulers to achieve a significant gain in term of performance and scalability, while software scheduling solutions impose excessive delays (in order of thousands of...
Article
Full-text available
Energy consumption and elevating the chip temperature become a serious challenge in designing embedded systems mainly due to transistor scaling and integration of more components into a single chip. The temperature of the chip has significant effects on leakage current, energy consumption and reliability of the chip; hence, discovering a mechanism...
Conference Paper
Sorting is one of the most important computational tasks in data processing applications. Recent studies show that the FPGA-based hardware accelerators are more efficient than the general-purpose processors and GPUs. By increasing the input records in the sorting network, the number of Compare-And-Swap (CAS) units would be increased, which in turn,...
Preprint
(This paper is accepted in MWSCAS 2019.) Sorting is one of the most important computational tasks in data processing applications. Recent studies show that the FPGA-based hardware accelerators are more efficient than the general-purpose processors and GPUs. By increasing the input records in the sorting network, the number of Compare-And-Swap (CAS)...
Article
This paper proposes a novel hardware-based multidimensional sorting algorithm and its respective architecture, called real-time hardware sorter (RTHS), for emerging data intensive processing applications where performance and resource conservation are serious concerns. The basic idea behind RTHS is to reduce the hardware complexity of parallel hard...
Article
Full-text available
A hardware Trojan (HT) is an extra circuitry inserted into a chip design with the malicious aim of functionality alteration, reliability degradation or secret information leakage. It is normally very hard to find HT activation signals since such signals are intended to activate upon occurring very rare conditions on specific nets of the infected ci...
Conference Paper
Full-text available
Ever increasing number of on-chip cores magnifies the need for efficient Network on Chip (NoC) architecture designs. To have a wide design space exploration, accurate simulators play a key role to estimate power consumption, area and temperature profile of NoCs. Access-Noxim as one of the well-known NoC simulators is used by several researchers to...
Article
This manuscript studies and analyzes the user behavioral model of a website. Our analysis show that users have different views when encounter with a problem and structure of a website. Issues such as sociology, psychology, economics and interest to computer science products make these different views. By studying the behaviors of users, a website c...
Article
In an application-layer distributed denial of service (DDoS) attack, zombie machines send a large number of legitimate requests to the victim server. Since these requests have legitimate formats and are sent through normal TCP connections, intrusion detection systems cannot detect them. In these attacks, an adversary does not saturate the bandwidth...
Article
Full-text available
In application-layer distributed denial of service (DDoS) attacks, zombie machines attack the victim server through legitimate packets such that packets havelegitimate format and are sent through normal TCP connections. Consequently, neither intrusion detection systems (IDS) nor victim server can detects malicious packets. This paper proposes a nov...
Article
Full-text available
This paper proposes a novel feedback-based control technique that tackles distributed denial of service (DDoS) attacks in four consecutive phases. While protection routers close to the server control inbound traffc rate andkeeps the server alive (phase 1), the server negotiate with upstream routers close to traffc sources to install leaky-buckets f...
Article
This paper reviews and analyzes well-known countermeasures against distributed denial of service (DDoS) attacks. This paper provides an in-depth analysis of each countermeasure and enumerates strengths and challenges of each technique. If it is possible, the paper designs a countermeasure against each defense mechanism from the attacker’s point of...
Article
The capability that a server can hide its location while offering various kinds of services to its clients is called hidden services or location-hiding. Almost previous low-latency anonymous communication systems such as Tor, MorphMix, etc., that can be used to implement hidden services are vulnerable against end-to-end traffic analysis attack. Thi...
Article
Full-text available
Today, the Internet has become a promising platform for network-based control systems (NBCS), where packets are used to transmit feedback and control signals between a plant and controllers. On the other hand, today’s distributed denial of service (DDoS) attacks cause significant disruption to the Internet, which threaten the operation of NBCS.This...
Article
This paper proposes a cooperative mechanism to tackle distributed denial of service (DDoS) attacks based on cooperation between the victim server and customer edge routers of the ISPs (internet service providers) that have traffic toward the victim server. The mechanism tackles the attack in three consecutive phases: first, before attack packets ca...
Conference Paper
Full-text available
Overlay networks are used as proxies which mediate communication between an application and its users with-out revealing the application's location (IP address). The capability that users can communicate with an application without knowing its location is called location-hiding. Al-though recent years have provided little literature about location-...
Article
Smart grids rely on a dependable information infrastructure for the monitoring and control applications. Two elements can enhance the suitability of the communication and control infrastructure for such smart grid applications. Overlay networks allow to resiliently deal with nodes that appear and disappear, as well as with the dynamic nature of the...
Conference Paper
Full-text available
Today, overlay networks are used as a promising platform to deploy wide area of applications and services in the Internet. The application level state maintained by the overlay networks should have high degree of availability.This can be compromised when a significant percentage of overlay nodes fails simultaneously (massive failure). The first pro...
Conference Paper
Full-text available
Distributed intelligence and secure interconnected communication networks constitute recognized key factors for the economic operation of electricity infrastructures in competitive power markets. Hence, electric power utilities need to extend risk management frameworks with adequate tools for assessing consequences of ICT (information and communica...
Conference Paper
Full-text available
Filtering techniques are one of the main approaches to protect applications from Denial of Service Attacks (DoS). However filtering techniques suffer from two main chal- lenges: a) the accuracy detection of DoS traffic and b) pro- cessing time. Fosel (Filtering with the help of an Overlay Security Layer) has been proposed to protect application sit...
Conference Paper
Full-text available
Today, peer-to-peer (P2P) systems are used as a promising platform to deploy new applications and services in the internet. There are much interest in emerging P2P overlay network because they provide a good substrate for creating large scale data sharing, content distribution and application-level multicast applications. Overlay networks also have...
Conference Paper
In the last few years, P2P systems have rapidly evolved and emerged as a promising platform to deploy new applications and services in the Internet. The main reasons for this is that P2P systems are self-organizing, have a decentralized nature, good scalability, efficient query search, and good resilience in the presence of node failures. However m...
Conference Paper
Full-text available
Overlay networks enable applications to communicate with users without disclosing their IP addresses; hence overlay networks are used to protect applications against DoS attacks by hiding an applicationpsilas location. This paper analyzes three popular overlay networks (Chord, CAN, and Pastry) by simulation to answer to this question: which topolog...
Conference Paper
Full-text available
The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility InfrastructurAL Resilience. The selected scenarios refer to power control systems encompassing information and communication security of SCADA systems for grid teleoperation, impact of attacks...
Chapter
Full-text available
Control systems for electrical microgrids rely ever more on heterogeneous off-the-shelf technology for hardware, software and networking among the intelligent electronic devices that are associated with dispersed energy resources. For distributed microgrid applications in a dynamic environment, overlay networks provide an opportunity for a flexible...
Conference Paper
Full-text available
Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure techniques try to detect attack and then filter out DoS attack packets. Unfortunately these techniques that filter DoS traffic by looking at known attack patterns or statistical anomalies in the traffic patterns can be defeated by...
Conference Paper
Full-text available
Today Internet is becoming an emerging technology for remote control of industrial applications, where one site needs to control another site remotely (e.g. power plants controllers). Denial-of-Service (DoS) attacks may cause significant disruptions to the Internet which will threaten the operation of such network based control systems. Overlay net...
Article
Full-text available
Various smart power grid applications can be based on agent control systems such as intelligent protection, agents in power market, supply demand matching, autonomous electricity grid (AEG), etc. The dynamic nature of these applications makes that the information infrastructure un-derlying the power grid is needed not only for static con-figuration...
Article
Full-text available
Today distributed industrial networks use Internet to transmit feedback and control signals between a plant and a controller. However there are several attacks on the Internet. From these attacks perhaps denial-of-service (DoS) attack is the most detrimen-tal one that affects the packet delivery. DoS attack causes significant disruption to the Inte...
Conference Paper
Full-text available
The general approach to fault tolerance in uniprocessor systems is to maintain enough time redundancy in the schedule so that any task instance can be re-executed in presence of faults during the execution. In this paper a scheme is presented to add enough and efficient time redundancy to the Earliest-Deadline-First (EDF) scheduling policy for peri...
Conference Paper
Full-text available
The general approach to fault tolerance in uniprocessor systems is to use time redundancy in the schedule so that any task instance can be re-executed in presence of faults during the execution. In this paper a scheme is presented to add enough and efficient time redundancy to the rate-monotonic (RM) scheduling policy for periodic real-time tasks....
Article
Full-text available
In order to improve and deploy distributed control systems for the power grid a robust ICT infrastructure is required partially based on dependable middleware that exploits redundancy and diversity in communication networks. The dynamic nature of power grid applications makes necessity of using peer-to-peer (P2P) networks in this system. The main r...
Article
Full-text available
In the last few years, P2P systems have rapidly evolved and emerged as a promising platform to deploy new applications and services in the internet. The main reasons for this is that P2P systems are self-organize, having decentralized nature, good scalability, having efficient query search, good resilience in the presence of node failures. However...
Conference Paper
Full-text available
This paper presents the performance analysis of several well-known partitioning scheduling algorithms in real-time and fault-tolerant multiprocessor systems. Both static and dynamic scheduling algorithms are analyzed. Partitioning scheduling algorithms, which are studied here, are heuristic algorithms that are formed by combining any of the bin-pac...
Article
Full-text available
Control systems for electrical microgrids rely ever more on an information infrastructure, consisting of heterogeneous off-the-shelf communication technology for hardware, software and networking. This provides flexibility for the application as new services become possible, but also implies vulnerabilities as the correct execution of microgrid con...

Network

Cited By