Mehran Alidoost Nia

Mehran Alidoost Nia
University of Tehran | UT · School of Electrical and Computer Engineering

Doctor of Philosophy
I'm actively collaborating with people around the world in the fields of verification, security & software engineering.

About

24
Publications
8,974
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
122
Citations
Introduction
Mehran Alidoost Nia is a researcher in DRTS Lab at University of Tehran. He is also a Programme Fellow at the University of York, and collaborating on Assuring Autonomy International Programme (AAIP). His main research interests are about Analysis of Cyber Physical Systems, Verification, Self-Adaptive Systems, Formal Approximation, and Computer Security. Also, His PhD thesis is entitled “Runtime Probabilistic Analysis of Self-Adaptive Systems via Formal Approximation Techniques”.
Additional affiliations
July 2020 - present
The University of York
Position
  • Fellow
Description
  • I work as a Programme Fellow at the University of York, and collaborating on Assuring Autonomy International Programme (AAIP) under supervision of Dr. Radu Calinescu as part of my PhD thesis since 2020.
September 2017 - September 2018
University of Tehran
Position
  • Lecturer
Description
  • Design of Programming Languages
September 2016 - present
University of Tehran
Position
  • Researcher in DRTS Lab
Education
September 2016 - February 2022
University of Tehran
Field of study
  • Software Engineering
September 2012 - February 2015
University of Guilan
Field of study
  • Software Engineering

Publications

Publications (24)
Article
Full-text available
Privacy is an important research topic due to its implications in society. Among the topics covered by privacy, we can highlight how to establish anonymous communications. During the latest years we have seen an important research in this field. In order to know what the state of the art in the research in anonymous communication systems (ACS) is,...
Article
Full-text available
In recent years, the increase of cyber threats has raised many concerns about security and privacy in the digital world. However, new attack methods are often limited to a few core techniques. In this paper, in order to detect new threat patterns, we use an attack graph structure to model unprecedented network traffic. This graph for the unknown at...
Article
Full-text available
Cyber-physical systems (CPS) are expected to continuously monitor the physical components to autonomously calculate appropriate runtime reactions to deal with the uncertain environmental conditions. Self-adaptation, as a promising concept to fulfil a set of provable rules, majorly needs runtime quantitative verification (RQV). Taking a few probabil...
Conference Paper
Full-text available
Ubiquitous and perpetual nature of cyber-physical systems (CPSs) have made them mostly battery-operated in many applications. The batteries need recharge via environmental energy sources. Solar energy harvesting is a conventional source for CPSs, whereas it is not perfectly predictable due to environmental changes. Thus, the system needs to adaptiv...
Article
Cyber-physical systems need self-adaptation as a mean to autonomously deal with changes. For runtime adaptation, a cyber-physical system repeatedly monitors the environment for detecting possible changes. Faults in the monitoring devices due to the dynamic and uncertain environment is very likely, necessitating resilient monitoring. In this paper,...
Thesis
Full-text available
Self-adaptive systems provide the ability of autonomous decision-making for handling the changes affecting the functionalities of cyber-physical systems. A self-adaptive system repeatedly monitors and analyzes the local system and the environment and makes significant decisions regarding fulfilling the system's functional optimization and safety re...
Article
Full-text available
Security threats have increased in recent years. To motivate the developers to stick to the security policies, the notion of usable security is investigated. Enhancing the usability of security services leads to developing software products that are resilient against security threats. In this paper, we investigate the role of usable security in dev...
Preprint
Full-text available
The autonomous systems need to decide how to react to the changes at runtime efficiently. The ability to rigorously analyze the environment and the system together is theoretically possible by the model-driven approaches; however, the model size and timing limitations are two significant obstacles against such an autonomous decision-making process....
Chapter
Full-text available
Automotive systems are widely upgraded with Internet-based applications. In these applications, we could be interested in preserving anonymity of communications and that senders (automotive system) could communicate in an anonymous way. For this purpose, we need to introduce the model of an anonymous communication system in automotive systems. The...
Conference Paper
Full-text available
Internet of things (IoT) has many applications in different industrial and automated systems. Considering the ubiquitous nature of the IoT, it is hard to deal with all possible security threats. However, the industrial IoT can resist against external attacks if its components would be self-adaptive. A self-adaptive system (SAS) is able to adjust it...
Conference Paper
Full-text available
The heterogeneity in cyber-physical systems (CPS) and the diverse situations that they may face with, along with the environmental hazards raise the need to self-stabilization. The uncertain nature of CPS necessitates a probabilistic view for analyzing the system stabilization-time that is a highly critical metric in distributed/time-sensitive appl...
Article
Full-text available
Anonymous communication systems (ACS) offer privacy and anonymity through the Internet. They are mostly free tools and are popular among users all over the world. In the recent years, anonymity applications faced many problems regarding traffic engineering methods. Even though they ensure privacy under some conditions, their anonymity will be endan...
Code
In order to facilitate the process of probabilistic analysis, we have developed an automatic code generator which is customized for PIF algorithm. We needed to test different tree structures to analyze synchronous PIF. To do that, a template for PIF commands is proposed. The template is organized based on the PIF code for primary tree structure inc...
Conference Paper
Full-text available
Anonymous communication systems (ACS) offer privacy and anonymity through the Internet. They are mostly free tools and are popular among users all over the world. In the recent years, anonymity applications faced many problems regarding traffic engineering methods. Even though they ensure privacy under some conditions, their anonymity will be endan...
Article
Full-text available
This paper presents a new approach to network traffic control based on the pattern theorem. In order to generate unique detection patterns for the process of traffic analysis, a self-avoiding walk algorithm is used. During data processing and analysis, the traffic patterns are adapted dynamically in real-time. The modified traffic patterns are syst...
Conference Paper
Full-text available
In the recent years, threats of malwares have been increasing. The violation of privacy and confidentiality in large networks and distributed systems is the main target for these malwares. To prevent such attacks, anti-virus systems are designed with different analysis methods and featuring regular updating service. But still we face many threats t...
Article
Full-text available
The increase of the capacity of processing units and the growth of distributed computing make easy to collect and process information of Internet traffic flows. This information, however, can be used to perform attacks in anonymous communications that could compromise privacy. With the aim of preventing these attacks, we propose a scheme that imple...
Conference Paper
Full-text available
Encrypted data cannot ensure full immunity especially in anonymous applications, Even though it protect data by encryption methods. On the other side, we encounter with a set of huge processing units that can reveal data pattern through Internet frameworks. Although intruders are not able to break encrypted layers of data, still they can concentrat...
Conference Paper
Full-text available
in this paper, the main idea is to establish IoT structure for ubiquitous communications. This structure has been made by data type modelling. Type modeling is useful to construct homogeneous computational pattern. A design cycle has been introduced here. This cycle is a wizard to cluster and insert computational nodes. For IoT intentions, data tha...
Article
Full-text available
Today, all types of digital signature schemes emphasis on secure and best verification methods. Different digital signature schemes are used in order for the websites, security organizations, banks and so on to verify user's validity. Digital signature schemes are categorized to several types such as proxy, on-time, batch and so on. In this paper,...
Conference Paper
Full-text available
Anonymous cloud architecture provides secure environment for business and also e-commerce approaches. By using this type of architecture, we can propose anonymous online applications. Customers who need secure and reliable online services should pay for provided services. A big problem is electronic payment that is needed for billing customers. But...
Article
In programmers point of view, Datatypes in programming language level have a simple description but inside hardware, huge machine codes are responsible to describe type features. Datatype architecture design is a novel approach to match programming features along with hardware design. In this paper a novel Data type-Based Code Reducer (TYPELINE) ar...

Network

Cited By

Projects

Project (1)
Project
Some issues that are expected to be responded by the current research project are listed below: 1) The first is the outstanding state-space explosion problem. As the size of the model increases, the analysis is going to be more complicated. Thus, for analyzing real-world self-adaptive systems, we need to cope with state-space explosion problem. 2) The second is the timing restrictions for each round of decision-making. Consider a self-adaptive system that must decide about adaptation tactic in several seconds. Therefore, the analysis result must be generated before the deadline. In this research proposal, timing constraints is considered in order to meet decision-making deadlines. 3) The third issue is that each adaptation tactic has latency. Consider a self-adaptive system consisting of some virtual machines (VMs). The latency of running each additional VM may take several minutes. If the self-adaptive system is not aware of adaptation latency, it may miss the deadlines for planning and executing the tactics. 4) The fourth issue is regarding large configuration space. Distributed self-adaptive systems need a huge amount of space because of maintenance of the system configuration. On one hand, many applications of self-adaptive system need to maintain the data related to some previous runs of the system. On the other hand, self-adaptive systems have limited resources to spend. If the size of the data for each round of analyzing round be large, the system face problem due to limited configuration space.