My Photo

Danial Javaheri Ph.D. in Computer Engineering - Software Systems

+98 916 667 7506

About Me

I'm Danial Javaheri, welcome to my personal website.

I am interested in computer engineering and performed a substantial amount of research in this field. I succeeded to received a B.Sc., M.Sc., and Ph.D. in computer (software) engineering from Islamic Azad University.

Currently, I am working for Bostan Rood corporation as a software engineer.

Area of Expertise

  • e-Healthcare Systems
  • Internet of Things
  • Network & Software Security
  • Data mining & Big Data
  • Software Testing
  • Software Architect
  • Dependable Systems Design

Contact Information


Phone: +98 916 667 7506

Telegram: @djavaheri

Hometown: Lorestan, Iran




My Practical Skills

  • App Programming C++/C#/VB.net11111
  • Web Programming
  • Database Programming SQL/MySQL11111
  • Virtualization Tools 11111
  • Machine Learning 11111
  • Simulator Tools1111

My Education

Work Expeirences


Academic Records

My Teaching Courses

For B.Sc. Students of Borujerd Branch of Islamic Azad University(2014-2015)

Advanced Computer Programming

Advanced Database





My Papers

Published ISI Papers (since 2018)

1- D. Javaheri, M. Hosseinzadeh, A.M. Rahmani, “Detection and Elimination of Spyware and Ransomware by Intercepting Kernel-Level System Routines”, IEEE Access, Vol. 6(1), pp. 78321-78332, 2018. (ISI - JCR Q1 - IF=4.098)

2- D. Javaheri, M. Hosseinzadeh, “A Framework for Recognition and Confronting of Obfuscated Malwares Based on Memory Dumping and Filter Drivers”, Wireless Personal Communications, Springer, vol. 98(1), pp.119-137, 2018. (ISI - JCR Q2 - IF=1.200)

Conference Papers (Since 2015)

1- D. Javaheri, H. Javaheri, A. Rouzbahani, “A Method for Detection and Defusing of Malicious Behavior of Novel Obfuscated Malwares”, In Proc. of Challenges and Solutions of Cyber Communications in Social Security, Social Security Research Institute of Iran, 24 Jan 2017.

2- D. Javaheri, Sh. Motahari, "Propose a Solution for Detection and Confronting of Code and Dynamic Link Library Injection Attacks", In 7th International Proc. of Information and Knowledge Technology (IKT), University of Urmia, 26-28 May 2015.

3- D. Javaheri, “Design and Implementing a Method for Intercepting Network-Based Behavioral for Construction an Intelligent Firewall”, In Proc. of 2nd National Conference on Applied Research in Computer Science and Information Technology, University of Tehran, 26 Feb 2015.

Technical Reports (2008-2015)

14- D. Javaheri, Quantum Computing and Quantum Computers, Islamic Azad University Borujerd Branch, 2010.

15- D. Javaheri, Introduction to ADA Programming Language, 2009.

16- D. Javaheri, Live Operating System ERD Commander 2005, 2008.

My Workshops




  • A Wrapper for Windows Firewall


    This application is a user-friendly wrapper to manage the internal firewall of windows OS with more facilities to monitor network traffic such as network connections and the rate of packets. Moreover, this software provides a wide range of abilities to configure the windows firewall with define desired rules, but, in a simple manner rather than, the firewall of windows.

  • The Generic Unpacker Application


    This generic unpacker can normalize and resolve the ambiguity of modern obfuscated malware, which are undetectable for traditional scanners. This efficient tool can unpack more than 300 recognized packers utilized for obfuscating malware. Moreover, it can unpack anonymous and customized packers through dynamic unpacking based on memory dumping. This useful software has derived from my Ph.D. thesis.

  • A Memory Dumper Application


    This application images the memory in user and kernel space of the operating system. It provides the feasibility of getting a dump file of a specific process or the entire system. The dump file can use for any troubleshooting process or digital forensic analysis by relevant tools.

  • A Hybrid Sandbox for Risk-free Analysis of Malware


    This project led to the creation of a sandbox tool to analyze malware in a safe and risk-free environment. At first, we designed a user-level sandbox that was able to track simple malware without the ability of reaction toward malware. Eventually, after performing plenty amount of research, we developed our sandbox to pursue kernel-level APIs and implementing the ability to confront complicated malware. My M.Sc. thesis was a portion of this valuable project.

  • Human Emulator Robot

    The massive rate of malware production caused emerging automated malware analysis tools like a sandbox. Unfortunately, malware becomes more complex and intelligent in recent years. Therefore, they recognize an automatic analyzer environment rather than a personal computer by intercepting the behavior of a human such as hitting the keyboard or moving the mouse, and they avoid to execute in analyzer environment to make themself hidden and remain anonymous. Hence, this useful tool is needed to emulate the behaviors of a human -just like a monkey- to detect and confront intelligent malware.
    Year: 2016



My Contact Information

Phone : +98 916 667 7506

Email :

Website :