The Computer System Architecture Department warmly welcomes students pursuing masters and doctoral degrees in the fields of computer architecture, cybersecurity, and digital forensics. The postgraduate programs offered in this department have a profound influence on the accomplishments of graduates, both within the country and on the global stage. Armed with a wide spectrum of expertise and technical abilities, these graduates will discover outstanding career opportunities across diverse companies, industries, organizations, and universities in the public and private sectors.
For detailed information about the research fields, visit the official homepage of each faculty member within the group. You will be provided with comprehensive insights into their respective areas of expertise and ongoing research endeavors.
This department has various research laboratories among which the following can be mentioned:
The Ph.D. program in the field of Computer Engineering represents the pinnacle of education in the realm of computer studies. The Computer Systems Architecture Department collaborates with the Computer Engineering Department to admit students through the national doctoral entrance exam as well as directly taking talented students by interview. This Ph.D. program aims to cultivate graduates who possess a deep understanding of the latest scientific advancements in their specialized fields. These graduates are equipped to devise innovative solutions, backed by rigorous scientific evaluation, even in scenarios where no solution exists for designing or implementing a computer system. The Ph.D. degree comprises both an educational component (optional) and a research section. The selection of the courses for the doctoral program aligns with those offered in the master?s program and is determined at the discretion of the supervisor.
In today s landscape of information technology and network systems, security and privacy stand out as paramount concerns. With the ubiquitous reach of the Internet, numerous government and private services now operate within this interconnected network. Malicious actors, by exploiting vulnerabilities in remote systems, can inflict irreparable financial, political, or security harm upon a nation. Moreover, the country s critical industries and infrastructures are increasingly reliant on network control. Exploiting weaknesses in these systems could potentially paralyze factories, cities, or even the entire nation.
The Cybersecurity M.Sc program is meticulously crafted to equip academic professionals with the skills needed to secure systems and combat security threats. Students learn the principles of establishing security within software and hardware systems and mastering techniques to safeguard information security and user privacy. Additionally, they gain expertise in network penetration testing, bolstering their ability to ensure robust protection and security.
One of the notable activities undertaken in the Computer Systems Architecture Department involves hosting an annual Capture the Flag (CTF) competition on an international scale. Simultaneously, the APA (Computer Information, Support, and Aid) laboratory, established in collaboration with the Information Technology Organization of Iran, tackles the nation?s cybersecurity challenges by leveraging the resources available within the university.
The students and researchers in this department employ cutting-edge techniques, including deep learning, reinforcement learning, and other machine learning (ML) and artificial intelligence (AI) methods in the field of cybersecurity. Additionally, they explore emerging technologies such as blockchain and cryptocurrencies. Some research areas in this program are:
The escalating demand for computer systems across diverse domains underscores the critical research challenges in the field of computer system architecture. These challenges encompass achieving higher efficiency, minimizing the required physical storage, reducing power consumption, and fortifying against security threats. In recent years, the advent of transformative technologies?such as the Internet of Things (IoT) and cloud computing?has intensified the urgency for more efficient computing algorithms and architectures.
The computer system architecture program, guided by its commitment to addressing the aforementioned challenges, encompasses education, research, and industrial endeavors related to computer systems across various tiers?ranging from the intricate transistor level to the broader realms of system and network levels. Some research areas in this program are:
As electronic tools become increasingly integral for providing and accessing financial, government, and social network services, alongside the expanding cyber activities of companies and organizations, the potential for these tools to be misused in various crimes?both cyber and non-cyber?has also risen. Consequently, relying solely on traditional evidence in judicial cases is no longer sufficient and digital evidence must be thoroughly examined, as well.
Digital forensics is an interdisciplinary field that focuses on the acquisition, identification, documentation, and analysis of digital evidence. This discipline has been offered by prominent universities worldwide since the late decade. Notably, in Iran, Tarbiat Modares University pioneered this field through an interdisciplinary master?s program managed by the Computer System Architecture Department (within the Faculty of Electrical and Computer Engineering), in collaboration with the Faculty of Law. Admission to this program is based on entrance exams and is open to graduates in computer engineering or related fields, adhering to the criteria set forth by the Ministry of Science, Research, and Technology.
Digital forensics courses introduce students to the principles and technical intricacies of acquiring, identifying, documenting, and analyzing digital evidence. Simultaneously, they delve into domestic and international legal considerations. As a result, graduates in this field acquire the essential knowledge and skills to lead or collaborate with research teams focused on cyber-attacks and crimes. These competencies find application in various professional jobs: