Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Raha Ziarati is active.

Publication


Featured researches published by Raha Ziarati.


foundations and practice of security | 2013

On the Reverse Engineering of the Citadel Botnet

Ashkan Rahimian; Raha Ziarati; Stere Preda; Mourad Debbabi

Citadel is an advanced information-stealing malware which targets financial information. This malware poses a real threat against the confidentiality and integrity of personal and business data. A joint operation was recently conducted by the FBI and the Microsoft Digital Crimes Unit in order to take down Citadel command-and-control servers. The operation caused some disruption in the botnet but has not stopped it completely. Due to the complex structure and advanced anti-reverse engineering techniques, the Citadel malware analysis process is both challenging and time-consuming. This allows cyber criminals to carry on with their attacks while the analysis is still in progress. In this paper, we present the results of the Citadel reverse engineering and provide additional insight into the functionality, inner workings, and open source components of the malware. In order to accelerate the reverse engineering process, we propose a clone-based analysis methodology. Citadel is an offspring of a previously analyzed malware called Zeus; thus, using the former as a reference, we can measure and quantify the similarities and differences of the new variant. Two types of code analysis techniques are provided in the methodology, namely assembly to source code matching and binary clone detection. The methodology can help reduce the number of functions requiring manual analysis. The analysis results prove that the approach is promising in Citadel malware analysis. Furthermore, the same approach is applicable to similar malware analysis scenarios.


conference of the centre for advanced studies on collaborative research | 2010

Aspect weaver: a model transformation approach for UML models

Mariam Nouh; Raha Ziarati; Djedjiga Mouheb; Dima Alhadidi; Mourad Debbabi; Lingyu Wang; Makan Pourzandi

Aspect-Oriented Modeling (AOM) is an emerging solution for handling crosscutting concerns at the software modeling level in order to reduce the complexity of software models and application code. In this paper, we present the implementation strategies of an aspect-oriented approach for weaving crosscutting concerns into UML models. The main advantages of the design and the implementation of our approach are the portability and the expressiveness thanks to the OMG standards: OCL and QVT languages. We instrument OCL to translate pointcuts into a language that can easily navigate a diagram and query its elements. We implement aspect weaving as a model-to-model transformation using QVT. Additionally, we provide semantics for matching and weaving in UML activity diagrams. Finally, we demonstrate the viability and the relevance of our propositions using a case study.


Archive | 2015

Aspect-Oriented Security Hardening of UML Design Models

Djedjiga Mouheb; Mourad Debbabi; Makan Pourzandi; Lingyu Wang; Mariam Nouh; Raha Ziarati; Dima Alhadidi; Chamseddine Talhi; Vitor Lima

This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models.The work is organized as follows: chapter 1 presents an introduction to software security, model-driven engineering, UML and aspect-oriented technologies. Chapters 2 and 3 provide an overview of UML language and the main concepts of aspect-oriented modeling (AOM) respectively. Chapter 4 explores the area of model-driven architecture with a focus on model transformations. The main approaches that are adopted in the literature for security specification and hardening are presented in chapter 5. After these more general presentations, chapter 6 introduces the AOM profile for security aspects specification. Afterwards, chapter 7 details the design and the implementation of the security weaving framework, including several real-life case studies to illustrate its applicability. Chapter 8 elaborates an operational semantics for the matching/weaving processes in activity diagrams, while chapters 9 and 10 present a denotational semantics for aspect matching and weaving in executable models following a continuation-passing style. Finally, a summary and evaluation of the work presented are provided in chapter 11.The book will benefit researchers in academia and industry as well as students interested in learning about recent research advances in the field of software security engineering.


Archive | 2015

Security Aspect Weaving

Djedjiga Mouheb; Mourad Debbabi; Makan Pourzandi; Lingyu Wang; Mariam Nouh; Raha Ziarati; Dima Alhadidi; Chamseddine Talhi; Vitor Lima

In this chapter, we present the design and implementation of the proposed security weaving framework. We start by providing a high-level overview that summarizes the main steps and the technologies that are followed to implement the weaving framework. Afterwards, we present the details of each weaving step. The proposed weaver is implemented as a model-to-model (M2M) transformation using the OMG standard Query/View/Transformation (QVT) language. In addition, it covers all the diagrams that are supported by our approach, i.e., class diagrams, state machine diagrams, activity diagrams, and sequence diagrams. For each diagram, we provide algorithms that implement its corresponding weaving adaptations. Moreover, we present the transformation rules that implement each aspect adaptation rule.


Archive | 2015

Model-Based Security

Djedjiga Mouheb; Mourad Debbabi; Makan Pourzandi; Lingyu Wang; Mariam Nouh; Raha Ziarati; Dima Alhadidi; Chamseddine Talhi; Vitor Lima

In this chapter, we present the background related to security at the modeling level. We start by investigating security specification approaches for UML design: (1) using UML artifacts, (2) extending UML meta-language, and (3) creating a new meta-language. Afterwards, we evaluate the usability of these approaches for security specification according to a set of defined criteria. Finally, we overview the main design mechanisms that are adopted for security hardening at the modeling level. These are security design patterns, mechanism-directed meta-languages, and aspect-oriented modeling.


Archive | 2015

Security Aspect Specification

Djedjiga Mouheb; Mourad Debbabi; Makan Pourzandi; Lingyu Wang; Mariam Nouh; Raha Ziarati; Dima Alhadidi; Chamseddine Talhi; Vitor Lima

In this chapter, we present the AOM profile proposed for the specification of security aspects on UML design models. The proposed profile covers the main UML diagrams that are used in software design, i.e., class diagrams, state machine diagrams, sequence diagrams, and activity diagrams. In addition, it covers most common AOP adaptations, i.e., adding new elements before, after, or around specific points, and removing existing elements. Moreover, we present a high-level and user-friendly pointcut language proposed to designate the locations where aspect adaptations should be injected into base models.


Archive | 2015

Static Matching and Weaving Semantics in Activity Diagrams

Djedjiga Mouheb; Mourad Debbabi; Makan Pourzandi; Lingyu Wang; Mariam Nouh; Raha Ziarati; Dima Alhadidi; Chamseddine Talhi; Vitor Lima

In this chapter, we present formal specifications for aspect matching and weaving in UML activity diagrams. We formalize both types of adaptations, i.e., add adaptations and remove adaptations. For the join point model, we consider not only executable nodes, i.e., action nodes, but also various control nodes. In addition, we derive algorithms for matching and weaving based on the semantic rules. Finally, we prove the correctness and the completeness of these algorithms with respect to the proposed semantics.


Archive | 2015

Aspect-Oriented Paradigm

Djedjiga Mouheb; Mourad Debbabi; Makan Pourzandi; Lingyu Wang; Mariam Nouh; Raha Ziarati; Dima Alhadidi; Chamseddine Talhi; Vitor Lima

In this chapter, we present an overview of the main Aspect-Oriented Programming (AOP) models. Additionally, we discuss the appropriateness of these AOP models from a security perspective. Moreover, we present the main constructs of the pointcut-advice model that is adopted in our framework. Finally, we introduce the main concepts of Aspect-Oriented Modeling (AOM).


Archive | 2015

Dynamic Matching and Weaving Semantics in \(\lambda \)-Calculus

Djedjiga Mouheb; Mourad Debbabi; Makan Pourzandi; Lingyu Wang; Mariam Nouh; Raha Ziarati; Dima Alhadidi; Chamseddine Talhi; Vitor Lima

In this chapter, we present a denotational semantics for aspect matching and weaving in lambda-calculus. The proposed semantics is based on the so-called Continuation-Passing Style (CPS) since this style of semantics provides a precise, accurate, and elegant description of aspect-oriented mechanisms. We first formalize semantics for a core language based on lambda-calculus. Afterwards, we extend the semantics by considering flow-based pointcuts, such as control flow and data flow that are important from a security perspective.


Archive | 2015

Model-Driven Architecture and Model Transformations

Djedjiga Mouheb; Mourad Debbabi; Makan Pourzandi; Lingyu Wang; Mariam Nouh; Raha Ziarati; Dima Alhadidi; Chamseddine Talhi; Vitor Lima

In this chapter, we explore the area of model transformation presented as part of the Model Driven Architecture (MDA) framework. In particular, we describe the main MDA layers and recall the main benefits of using the MDA approach. Afterwards, we provide an overview of the different kinds of MDA transformations as well as the different applications of model transformations. Finally, we study the most important model transformation languages and tools.

Collaboration


Dive into the Raha Ziarati's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chamseddine Talhi

École de technologie supérieure

View shared research outputs
Top Co-Authors

Avatar

Mariam Nouh

King Abdulaziz City for Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Mariam Nouh

King Abdulaziz City for Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge