-
Defying the Odds: Solana's Unexpected Resilience in Spite of the Security Challenges Faced by Developers
Authors:
Sébastien Andreina,
Tobias Cloosters,
Lucas Davi,
Jens-Rene Giesen,
Marco Gutfleisch,
Ghassan Karame,
Alena Naiakshina,
Houda Naji
Abstract:
Solana gained considerable attention as one of the most popular blockchain platforms for deploying decentralized applications. Compared to Ethereum, however, we observe a lack of research on how Solana smart contract developers handle security, what challenges they encounter, and how this affects the overall security of the ecosystem. To address this, we conducted the first comprehensive study on…
▽ More
Solana gained considerable attention as one of the most popular blockchain platforms for deploying decentralized applications. Compared to Ethereum, however, we observe a lack of research on how Solana smart contract developers handle security, what challenges they encounter, and how this affects the overall security of the ecosystem. To address this, we conducted the first comprehensive study on the Solana platform consisting of a 90-minute Solana smart contract code review task with 35 participants followed by interviews with a subset of seven participants. Our study shows, quite alarmingly, that none of the participants could detect all important security vulnerabilities in a code review task and that 83% of the participants are likely to release vulnerable smart contracts. Our study also sheds light on the root causes of developers' challenges with Solana smart contract development, suggesting the need for better security guidance and resources. In spite of these challenges, our automated analysis on currently deployed Solana smart contracts surprisingly suggests that the prevalence of vulnerabilities - especially those pointed out as the most challenging in our developer study - is below 0.3%. We explore the causes of this counter-intuitive resilience and show that frameworks, such as Anchor, are aiding Solana developers in deploying secure contracts.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Reducing energy consumption of cloud data centers using proper placement of virtual machines
Authors:
Hamid Reza Naji,
Reza Esmaeili
Abstract:
In today's world, the use of cloud data centers for easy access to data and processing resources is expanding rapidly. Rapid technology growth and increasing number of users make hardware and software architectures upgrade a constant need. The necessary infrastructure to implement this architecture is the use of virtual machines in physical systems. The main issue in this architecture is how to al…
▽ More
In today's world, the use of cloud data centers for easy access to data and processing resources is expanding rapidly. Rapid technology growth and increasing number of users make hardware and software architectures upgrade a constant need. The necessary infrastructure to implement this architecture is the use of virtual machines in physical systems. The main issue in this architecture is how to allocate virtual machines to physical machines on the network. In this paper we have proposed a method to use virtualization for minimizing energy consumption and decreasing the cloud resource waste. We have used learning automata as a reinforcement learning model for optimal placement of virtual machines. The simulation results show the proposed method has good performance in reducing energy consumption of servers in cloud data centers.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Load balancing in cloud data centers with optimized virtual machines placement
Authors:
Hamid Reza naji,
Reza Esmaeili
Abstract:
So far, various solutions have been proposed for symmetric distribution of load cloud computing environments. In this article, a new solution to the optimal allocation of virtual machines in the cloud data centers is presented to provide a good load balancing among servers. The proposed method offers a solution uses learning automata as a reinforcement learning model to improve the performance of…
▽ More
So far, various solutions have been proposed for symmetric distribution of load cloud computing environments. In this article, a new solution to the optimal allocation of virtual machines in the cloud data centers is presented to provide a good load balancing among servers. The proposed method offers a solution uses learning automata as a reinforcement learning model to improve the performance of the optimization algorithm for optimal placement of virtual machines. Also, it helps the search algorithm to converge more quickly to the global optimum. The simulation results show the proposed method has been able to perform good level of load balancing in cloud data centers.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Risk Management of Unmanned Aerial Vehicles
Authors:
Hamid Reza Naji,
Aref Ayati
Abstract:
This paper presents an efficient risk management model for unmanned aerial vehicles or UAVs. Our proposed risk management establishes a cyclic model with a continuous and iterative structure that is very adaptable to agile methods and all IT-related resources. This model can be used in many applications, but as a case study, we have discussed it for UAVs. The increasing use of UAVs or drones in ma…
▽ More
This paper presents an efficient risk management model for unmanned aerial vehicles or UAVs. Our proposed risk management establishes a cyclic model with a continuous and iterative structure that is very adaptable to agile methods and all IT-related resources. This model can be used in many applications, but as a case study, we have discussed it for UAVs. The increasing use of UAVs or drones in many fields and the existence of different threats is the main reason to have an efficient risk management method for them. In this paper, we cover risks based on IT-driven assets to decrease the chance of losing any data, failing the equipment or the system, and missing the reputation or credit based on cyclic and iterative flow. Our current risk management model for UAVs or drones is based on qualitative measures and can cover most of IT-based risks.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Learning Nuclei Representations with Masked Image Modelling
Authors:
Piotr Wójcik,
Hussein Naji,
Adrian Simon,
Reinhard Büttner,
Katarzyna Bożek
Abstract:
Masked image modelling (MIM) is a powerful self-supervised representation learning paradigm, whose potential has not been widely demonstrated in medical image analysis. In this work, we show the capacity of MIM to capture rich semantic representations of Haemotoxylin & Eosin (H&E)-stained images at the nuclear level. Inspired by Bidirectional Encoder representation from Image Transformers (BEiT),…
▽ More
Masked image modelling (MIM) is a powerful self-supervised representation learning paradigm, whose potential has not been widely demonstrated in medical image analysis. In this work, we show the capacity of MIM to capture rich semantic representations of Haemotoxylin & Eosin (H&E)-stained images at the nuclear level. Inspired by Bidirectional Encoder representation from Image Transformers (BEiT), we split the images into smaller patches and generate corresponding discrete visual tokens. In addition to the regular grid-based patches, typically used in visual Transformers, we introduce patches of individual cell nuclei. We propose positional encoding of the irregular distribution of these structures within an image. We pre-train the model in a self-supervised manner on H&E-stained whole-slide images of diffuse large B-cell lymphoma, where cell nuclei have been segmented. The pre-training objective is to recover the original discrete visual tokens of the masked image on the one hand, and to reconstruct the visual tokens of the masked object instances on the other. Coupling these two pre-training tasks allows us to build powerful, context-aware representations of nuclei. Our model generalizes well and can be fine-tuned on downstream classification tasks, achieving improved cell classification accuracy on PanNuke dataset by more than 5% compared to current instance segmentation methods.
△ Less
Submitted 29 June, 2023;
originally announced June 2023.
-
Internet of Things and Health Care in Pandemic COVID-19: System Requirements Evaluation
Authors:
Hasan Naji,
Nicolae Goga,
Ammar Karkar,
Iuliana Marin,
Haider Abdullah Ali
Abstract:
Technology adoption in healthcare services has resulted in advancing care delivery services and improving the experiences of patients. This paper presents research that aims to find the important requirements for a remote monitoring system for patients with COVID-19. As this pandemic is growing more and more, there is a critical need for such systems. In this paper, the requirements and the value…
▽ More
Technology adoption in healthcare services has resulted in advancing care delivery services and improving the experiences of patients. This paper presents research that aims to find the important requirements for a remote monitoring system for patients with COVID-19. As this pandemic is growing more and more, there is a critical need for such systems. In this paper, the requirements and the value are determined for the proposed system, which integrates a smart bracelet that helps to signal patient vital signs. (376) participants completed the online quantitative survey. According to the study results, Most Healthcare Experts, (97.9%) stated that the automated wearable device is very useful, it plays an essential role in routine healthcare tasks (in early diagnosis, quarantine enforcement, and patient status monitoring), and it simplifies their routine healthcare activities. I addition, the main vital signs based on their expert opinion should include temperature (66% of participants) and oxygenation level (95% of participants). These findings are essential to any academic and industrial future efforts to develop these vital wearable systems. The future work will involve implementing the design based on the results of this study and use machine-learning algorithm to better detect the COVID-19 cases based on the monitoring of vital signs and symptoms.
△ Less
Submitted 5 May, 2022;
originally announced May 2022.
-
Novel Design and Implementation of a Vehicle Controlling and Tracking System
Authors:
Hasan Naji,
Iuliana Marin,
Nicolae Goga,
Cristian Taslitschi
Abstract:
The purpose of this project is to build a system that will quickly track the location of a stolen vehicle, thereby reducing the cost and effort of police. Moreover, the vehicle's computer system can be controlled remotely by the owners of the vehicle or police. More precisely, the goal of this work is to design a, develop remote control of the vehicle, and find the locations with Latitude (LAT) an…
▽ More
The purpose of this project is to build a system that will quickly track the location of a stolen vehicle, thereby reducing the cost and effort of police. Moreover, the vehicle's computer system can be controlled remotely by the owners of the vehicle or police. More precisely, the goal of this work is to design a, develop remote control of the vehicle, and find the locations with Latitude (LAT) and Longitude (LONG).
△ Less
Submitted 29 January, 2021;
originally announced February 2021.
-
A Novel Memetic Feature Selection Algorithm
Authors:
Mohadeseh Montazeri,
Hamid Reza Naji,
Mitra Montazeri,
Ahmad Faraahi
Abstract:
Feature selection is a problem of finding efficient features among all features in which the final feature set can improve accuracy and reduce complexity. In feature selection algorithms search strategies are key aspects. Since feature selection is an NP-Hard problem; therefore heuristic algorithms have been studied to solve this problem. In this paper, we have proposed a method based on memetic a…
▽ More
Feature selection is a problem of finding efficient features among all features in which the final feature set can improve accuracy and reduce complexity. In feature selection algorithms search strategies are key aspects. Since feature selection is an NP-Hard problem; therefore heuristic algorithms have been studied to solve this problem. In this paper, we have proposed a method based on memetic algorithm to find an efficient feature subset for a classification problem. It incorporates a filter method in the genetic algorithm to improve classification performance and accelerates the search in identifying core feature subsets. Particularly, the method adds or deletes a feature from a candidate feature subset based on the multivariate feature information. Empirical study on commonly data sets of the university of California, Irvine shows that the proposed method outperforms existing methods.
△ Less
Submitted 26 January, 2016;
originally announced January 2016.
-
Reconfigurable Parallel Data Flow Architecture
Authors:
Hamid Reza Naji
Abstract:
This paper presents a reconfigurable parallel data flow architecture. This architecture uses the concepts of multi-agent paradigm in reconfigurable hardware systems. The utilization of this new paradigm has the potential to greatly increase the flexibility, efficiency, expandability of data flow systems and to provide an attractive alternative to the current set of disjoint approaches that are cur…
▽ More
This paper presents a reconfigurable parallel data flow architecture. This architecture uses the concepts of multi-agent paradigm in reconfigurable hardware systems. The utilization of this new paradigm has the potential to greatly increase the flexibility, efficiency, expandability of data flow systems and to provide an attractive alternative to the current set of disjoint approaches that are currently applied to this problem domain. The ability of methodology to implement data flow type processing with different models is presented in this paper.
△ Less
Submitted 9 March, 2010;
originally announced March 2010.