I am an assistant professor with the department of Computer Engineering at Sharif University of Technology. I obtained my B.E. in Electrical Engineering from the City College of New York in 1999, and my M.S. and Ph.D. in Electrical Engineering from the Polytechnic University, Brooklyn, New York, in 2002 and 2006 respectively. Before joining Sharif University I was at at&t labs. My current research interests are in computer and network security.




I am currently fully occupied with heading the Sharif IT center. Best way to contact me would be through email, and I do apologize in advance for the delayed response to your email :)





MS Thesis Supervision: If you are interested in conducting your master's thesis under my supervision, then please visit this page

Recommendation Letter: I get asked a lot if I am willing to write a recommendation letter. Please read this before asking me to write you one!

Thesis Template: You could obtain the XeLaTeX thesis template based on the Sharif University of Technology (SUT) layout
here. This is good for both PhD and MS.



Quick Links:   Projects   Courses   Publications   Talks

Projects:

Partov (Portable and Reliable Tool fOr Virtualization) is a network simulation and virtualization system, employed as a teaching tool for the computer networks course.

Courses:

CE 40-443 Computer Networks [F87]  [88]  [89]  [90]  [91]  [92]  [93]  [S94]   [S95]
CE 40-817 Advanced Network Security [F87]  [S88]  [S89]  [S90]   [F90Kish]   [S91]   [92]   [93]  [F94]
CE 40-693 Advanced Computer Networks [F88]  [F89]   [F90]   [F91]
CE 40-416 Computer Networks Lab [F89]  [S90]  [F90]   [S91]
CE 40-442 Data and Network Security [F90Kish]

Publications:

    Journal:

  1. Detection of Fast-Flux Botnets Through DNS Traffic Analysis, E. Soltanaghaei, M. Kharrazi, Scientia Iranica, Transactions D: Computer Science & Engineering and Electrical Engineering, 2015.

  2. A Composite-Metric Based Path Selection Technique for the Tor Anonymity Network, S. Momeni Milajerdi, M. Kharrazi, Journal of Systems and Software, 2015.

  3. Back to Static Analysis for Kernel-Level Rootkit Detection, S.A. Musavi, M. Kharrazi, IEEE Transactions on Information Forensics and Security, 2014.

  4. Partov: A Network Simulation and Emulation Tool, B. Momeni, M. Kharrazi, Journal of Simulation, 2014.

  5. Payload Attribution via Character Dependent Multi-Bloom Filters, M.H. Haghighat, M. Tavakoli, M. Kharrazi, IEEE Transactions on Information Forensics and Security, Volume 8, Issue 5, 2013.[BibTex]

  6. Improving Computer Networks Course Using the Partov Simulation Engine, B. Momeni, M. Kharrazi, IEEE Transactions on Education, Volume 55, Issue 3, August 2012.[BibTex]
  7. The partov source code is being released under GPLv3. If you are interested in obtaining the code, please contact me.

  8. Performance Study of Common Image Steganography and Steganalysis Techniques, M. Kharrazi, H. T. Sencar, N. Memon, Journal of Electronic Imaging, Volume 15, Issue 4, October-December 2006. [BibTex]

  9. Improving Steganalysis by Fusion Techniques: A Case Study with Image Based Steganography, M. Kharrazi, H. T. Sencar, N. Memon, LNCS Transactions on Data Hiding and Multimedia Security I, Volume 4300, 2006. [BibTex]

  10. Image Steganalysis with Binary Similarity Measures, I. Avcibas, M. Kharrazi, N. Memon, B. Sankur, EURASIP Journal on Applied Signal Processing, vol. 2005, no. 17, 2005. [BibTex]

  11. Data Masking: A New Approach for Steganography?, R. Radhakrishnan, M. Kharrazi, N. Memon, The Journal of VLSI Signal Processing, Volume 41, Number 3, November 2005. [BibTex]

  12. Image Steganography: Concepts and Practice, M. Kharrazi, H. T. Sencar, N. Memon, Lecture Notes Series, Institute for Mathematical Sciences, National University of Singapore, 2004. [BibTex]

    Conference:

  1. An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets, S. Arshad, M. Abbaspour, M. Kharrazi, H. Sanatkar, International Conference on Computer Applications and Industrial Electronics (ICCAIE), 2011.

  2. Passive Worm and Malware Detection in Peer-to-Peer Networks, S. Fahimian, A. Movahed, M. Kharrazi, IEEE/IFIP International Symposium on Trusted Computing and Communications (Trustcom10), 2010

  3. 2PLoc: Preserving Privacy in Location-Based Services, A. Salar Amoli, M. Kharrazi, R. Jalili, IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT10), 2010

  4. Towards Real-Time Performance Monitoring for Encrypted Traffic, M. Kharrazi, S. Sen, O. Spatscheck, ACM SIGCOMM Workshop on Internet Network Management (INM), 2007

  5. Cover Selection for Steganographic Embedding, M. Kharrazi, H. T. Sencar, N. Memon, IEEE International Conference on Image Processing, 2006

  6. Improving Steganalysis by Fusion Techniques: A Case Study with Image Based Steganography, M. Kharrazi, H. T. Sencar, N. Memon, SPIE Symposium on Electronic Imaging, 2006

  7. Benchmarking steganographic and steganalysis techniques, M. Kharrazi, H. T. Sencar, N. Memon, SPIE Symposium on Electronic Imaging, 2005

  8. PSteg: steganographic embedding through patching, K. Petrowski, M. Kharrazi, H. T. Sencar, N. Memon, IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005

  9. Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type, K. Shanmugasundaram, M. Kharrazi, N. Memon, Annual Computer Security Applications Conference, 2004

  10. Blind source camera identification, M. Kharrazi, H. T. Sencar, N. Memon, IEEE International Conference on Image Processing, 2004

  11. Network Abuse Detection via Flow Content Characterization, M. Kharrazi, K. Shanmugasundaram, N. Memon, 5th Annual IEEE Information Assurance Workshop, 2004

  12. Image Steganography and Steganalysis: Concepts and Practice, R. Chandramouli, M. Kharrazi, N. Memon, International Workshop on Digital Watermarking, 2003

  13. ODISSEA: A Peer-to-Peer Architecture for Scalable Web Search and Information Retrieval, M. Kharrazi, T. Suel, A. Delis, et. al., Sixth International Workshop on Web and Databases (WebDB), 2003



Talks:

Reviewing a few attacks on android, ISCISC 2014 [pdf]