The Computer System Architecture Department warmly welcomes students pursuing masters and doctoral degrees in the fields of computer architecture, cybersecurity, and digital forensics. The postgraduate programs offered in this department have a profound influence on the accomplishments of graduates, both within the country and on the global stage. Armed with a wide spectrum of expertise and technical abilities, these graduates will discover outstanding career opportunities across diverse companies, industries, organizations, and universities in the public and private sectors.

Research priorities of faculty members are:

  • Improving the efficiency and reliability of machine learning (ML) algorithms with hardware considerations
  • Production and detection of malware using machine learning (ML) and deep learning (DL) methods
  • The 5G and 6G mobile networks
  • Cloud computing applications considering security and privacy
  • Detection and analysis of software vulnerabilities
  • Providing decentralized autonomous systems with an emphasis on security and privacy
  • Security of cyber-physical systems (CPS)
  • Data analysis in digital forensics
  • Designing efficient and reliable energy systems

For detailed information about the research fields, visit the official homepage of each faculty member within the group. You will be provided with comprehensive insights into their respective areas of expertise and ongoing research endeavors.

Research Laboratories

This department has various research laboratories among which the following can be mentioned:

  • APA Center (information, support, and computer aid) in cooperation with Iran Information Technology Organization
  • Blockchain laboratory
  • Intrusion detection and prevention laboratory
  • Laboratory of computer architecture and reliable systems
  • Social Network Security laboratory
  • Software Security laboratory

The Ph.D. Program

The Ph.D. program in the field of Computer Engineering represents the pinnacle of education in the realm of computer studies. The Computer Systems Architecture Department collaborates with the Computer Engineering Department to admit students through the national doctoral entrance exam as well as directly taking talented students by interview. This Ph.D. program aims to cultivate graduates who possess a deep understanding of the latest scientific advancements in their specialized fields. These graduates are equipped to devise innovative solutions, backed by rigorous scientific evaluation, even in scenarios where no solution exists for designing or implementing a computer system. The Ph.D. degree comprises both an educational component (optional) and a research section. The selection of the courses for the doctoral program aligns with those offered in the master?s program and is determined at the discretion of the supervisor.

The Master of Cybersecurity (Secure Computing) Program

In today s landscape of information technology and network systems, security and privacy stand out as paramount concerns. With the ubiquitous reach of the Internet, numerous government and private services now operate within this interconnected network. Malicious actors, by exploiting vulnerabilities in remote systems, can inflict irreparable financial, political, or security harm upon a nation. Moreover, the country s critical industries and infrastructures are increasingly reliant on network control. Exploiting weaknesses in these systems could potentially paralyze factories, cities, or even the entire nation.
The Cybersecurity M.Sc program is meticulously crafted to equip academic professionals with the skills needed to secure systems and combat security threats. Students learn the principles of establishing security within software and hardware systems and mastering techniques to safeguard information security and user privacy. Additionally, they gain expertise in network penetration testing, bolstering their ability to ensure robust protection and security.
One of the notable activities undertaken in the Computer Systems Architecture Department involves hosting an annual Capture the Flag (CTF) competition on an international scale. Simultaneously, the APA (Computer Information, Support, and Aid) laboratory, established in collaboration with the Information Technology Organization of Iran, tackles the nation?s cybersecurity challenges by leveraging the resources available within the university.
The students and researchers in this department employ cutting-edge techniques, including deep learning, reinforcement learning, and other machine learning (ML) and artificial intelligence (AI) methods in the field of cybersecurity. Additionally, they explore emerging technologies such as blockchain and cryptocurrencies. Some research areas in this program are:

  • Network security and intrusion detection
  • Detection of software vulnerabilities
  • Detection of hardware Trojans
  • Malware analysis
  • Trust and privacy management
  • Security of distributed systems, Internet of Things (IoT), and cloud systems
  • E-commerce security, cryptocurrencies, and the use of blockchain technology in different layers and applications
  • Application of artificial intelligence (AI) algorithms in the mentioned fields

The Master of Computer System Architecture Program

The escalating demand for computer systems across diverse domains underscores the critical research challenges in the field of computer system architecture. These challenges encompass achieving higher efficiency, minimizing the required physical storage, reducing power consumption, and fortifying against security threats. In recent years, the advent of transformative technologies?such as the Internet of Things (IoT) and cloud computing?has intensified the urgency for more efficient computing algorithms and architectures.
The computer system architecture program, guided by its commitment to addressing the aforementioned challenges, encompasses education, research, and industrial endeavors related to computer systems across various tiers?ranging from the intricate transistor level to the broader realms of system and network levels. Some research areas in this program are:

  • Computer networks, cloud computing, edge computing, and the Internet of Things (IoT).
  • Embedded, approximate, and Neuro-morphic computing systems
  • Evaluation and management of efficiency, temperature, and energy consumption in computer systems
  • Security and trust in hardware, detection of hardware trojans
  • Hardware implementation of cryptographic algorithms
  • Reconfigurable systems and FPGA architecture
  • Reliability and design of fault-tolerant systems
  • Automation methods in the design and synthesis of digital systems with CAD tools
  • Application of artificial intelligence (AI) algorithms in the mentioned fields

The Master of Digital Forensics Program

As electronic tools become increasingly integral for providing and accessing financial, government, and social network services, alongside the expanding cyber activities of companies and organizations, the potential for these tools to be misused in various crimes?both cyber and non-cyber?has also risen. Consequently, relying solely on traditional evidence in judicial cases is no longer sufficient and digital evidence must be thoroughly examined, as well.
Digital forensics is an interdisciplinary field that focuses on the acquisition, identification, documentation, and analysis of digital evidence. This discipline has been offered by prominent universities worldwide since the late decade. Notably, in Iran, Tarbiat Modares University pioneered this field through an interdisciplinary master?s program managed by the Computer System Architecture Department (within the Faculty of Electrical and Computer Engineering), in collaboration with the Faculty of Law. Admission to this program is based on entrance exams and is open to graduates in computer engineering or related fields, adhering to the criteria set forth by the Ministry of Science, Research, and Technology.
Digital forensics courses introduce students to the principles and technical intricacies of acquiring, identifying, documenting, and analyzing digital evidence. Simultaneously, they delve into domestic and international legal considerations. As a result, graduates in this field acquire the essential knowledge and skills to lead or collaborate with research teams focused on cyber-attacks and crimes. These competencies find application in various professional jobs:

  • Private Companies: Particularly those engaged in information technology (IT) and network security.
  • Government Organizations and Institutions: Including national or local CERTs, information technology organizations, and network security units within organizations and institutions.
  • Judicial and Police Institutions: Where expertise in digital forensics is invaluable.
  • Advanced Roles: Such as developing digital forensics software, verifying existing software, and managing cyberspace security.
عبارت خود را درج و جهت جستجو "Enter" را بفشارید