Home > Departments > Computer System Architecture > Courses 

Courses


 

.:: Ph.D::.

Computer Engineering
Introduction

The Ph.D. program in computer engineering represents the pinnacle of education in computer studies. The Computer System Architecture Department collaborates with the Computer Engineering Department to admit students through the national doctoral entrance exam and directly admits talented students through interviews. This program aims to cultivate graduates who deeply understand the latest scientific advancements in their fields of expertise. These graduates are equipped to devise innovative solutions supported by rigorous scientific evaluation, even when there is no solution to design or implement a computer system. The Ph.D. degree, akin to the M.Sc., comprises educational and research components. The doctoral program courses are shared with the courses offered in the master?s program and are determined at the supervisor?s discretion.


.:: MS.c.::.

Cybersecurity (Secure Computing)
Introduction

Security and privacy are paramount concerns in today?s information technology and network systems. With the ubiquitous reach of the Internet, many public and private services are now operating within this interconnected network. By exploiting vulnerabilities in remote systems, malicious actors can inflict irreparable financial, political, or security harm upon a nation. Moreover, the country?s critical industries and infrastructures increasingly rely on network control. Exploiting weaknesses in these systems could potentially paralyze factories, cities, or even the entire nation.
The cybersecurity program is meticulously crafted to equip academic professionals with the skills needed to secure systems and combat security threats. Students learn the principles of establishing security within software and hardware systems and mastering techniques to safeguard information security and user privacy. Additionally, they gain expertise in network security assessment, bolstering their ability to ensure robust protection and security.
One of the notable activities carried out in the Computer System Architecture Department is hosting an annual Capture the Flag (CTF) competition on an international scale. Simultaneously, the APA (Computer Awareness, Support, and Assistance) laboratory, established in collaboration with the Information Technology Organization of Iran, tackles the nation?s cybersecurity challenges by leveraging the resources available within the university.
Students and researchers in this department employ cutting-edge techniques, including deep learning, reinforcement learning, and other machine learning and artificial intelligence (AI) techniques in cybersecurity. Additionally, they explore emerging technologies such as blockchain and cryptocurrencies. Some research areas in this program are as follows:
Network security and intrusion detection
Detection of software vulnerabilities
Detection of hardware Trojans
Malware analysis
Trust and privacy management
Security of distributed systems, Internet of Things (IoT), and cloud systems
E-commerce security, cryptocurrencies, and the use of blockchain technology in different applications
Application of artificial intelligence (AI) algorithms in the mentioned fields


Computer System Architecture
Introduction

The escalating demand for computer systems across diverse domains underscores the critical research challenges in computer system architecture. These challenges encompass achieving higher efficiency, minimizing the required physical storage, reducing power consumption, and fortifying against security threats. In recent years, the advent of transformative technologies?such as the Internet of Things (IoT) and cloud computing?has intensified the urgency for more efficient computing algorithms and architectures.
The computer system architecture program, guided by its commitment to addressing the aforementioned challenges, encompasses education, research, and industrial endeavors related to computer systems across various tiers?ranging from the intricate transistor level to the broader realms of system and network levels. Some research areas in this program are as follows:
Computer networks, cloud computing, edge computing, and the Internet of Things (IoT)
Embedded, approximate, and neuromorphic computing systems
Evaluation and management of efficiency, temperature, and energy consumption in computer systems
Security and trust in hardware, detection of hardware Trojans
Hardware implementation of cryptographic algorithms
Reconfigurable systems and FPGA architectures
Reliability and design of fault-tolerant systems
Automation methods in the design and synthesis of digital systems with CAD tools
Application of artificial intelligence (AI) algorithms in the mentioned fields


Digital Forensics
Introduction

As electronic tools become increasingly integral for providing and accessing financial, government, and social network services, alongside the expanding cyber activities of companies and organizations, the potential for these tools to be misused in various crimes?both cyber and non-cyber?has also risen. Consequently, relying solely on traditional evidence in judicial cases is no longer sufficient and digital evidence must also be thoroughly examined.
Digital forensics is an interdisciplinary field that focuses on acquiring, identifying, documenting, and analyzing digital evidence. This discipline has been offered by prominent universities worldwide since the late decade. Tarbiat Modares University pioneered this field in Iran through an interdisciplinary master?s program managed by the Computer System Architecture Department (within the Faculty of Electrical and Computer Engineering) in collaboration with the Faculty of Law. Admission to this program is based on entrance exams. It is open to graduates in computer engineering or related fields, adhering to the criteria set forth by the Ministry of Science, Research, and Technology.
Digital forensics courses introduce students to the principles and technical intricacies of acquiring, identifying, documenting, and analyzing digital evidence. Simultaneously, they delve into domestic and international legal considerations. As a result, graduates in this field acquire the essential knowledge and skills to lead or collaborate with research teams focused on cyber-attacks and crimes. These competencies find application in various professional jobs:
Private companies (particularly those engaged in information and communication technology)
Government organizations and institutions (including national or local CERTs, information technology organizations, and network security units within government and private organizations and institutions)
Judicial and police institutions
Advanced roles (such as developing digital forensics software, verifying existing software, and managing cyberspace security)