Leonardo Querzoni

Pubblicazioni

Titolo Pubblicato in Anno
MalFamAware: Automatic Family Identification and Malware Classification Through Online Clustering INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2020
Byzantine Generalized Lattice Agreement Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS) 2020
Italian National Framework for Cybersecurity and Data Protection Privacy Technologies and Policy. APF 2020 2020
Fuzzing Binaries for Memory Safety Errors with QASan Proceedings - 2020 IEEE Secure Development, SecDev 2020 2020
Load-Aware Shedding in Stream Processing Systems Transactions on Large-Scale Data- and Knowledge-Centered Systems 2020
Synchronous byzantine lattice agreement in O(log(f)) rounds Proceedings - International Conference on Distributed Computing Systems 2020
Smart manufacturing in the framework of space industry. An industry 4.0 approach to large scale production of satellite constellations Proceedings of the International Astronautical Congress, IAC 2020
Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis Proceedings BAR 2019 Workshop on Binary Analysis Research 2019
SAFE: Self-Attentive Function Embeddings for Binary Similarity Detection of Intrusions and Malware, and Vulnerability Assessment 2019
PASCAL: An architecture for proactive auto-scaling of distributed services FUTURE GENERATION COMPUTER SYSTEMS 2019
Peel the onion: Recognition of Android apps behind the Tor Network 2019
FADa-CPS—Faults and Attacks Discrimination in Cyber Physical Systems Policy-Based Autonomic Data Governance 2019
Triage of IoT Attacks Through Process Mining On the Move to Meaningful Internet Systems: OTM 2019 Conferences 2019
Peel the Onion: Recognition of Android Apps Behind the Tor Network Information Security Practice and Experience 2019
Foreword DEBS 2019 - Proceedings of the 13th ACM International Conference on Distributed and Event-Based Systems 2019
Elastic Symbiotic Scaling of Operators and Resources in Stream Processing Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2018
Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici 2018
PDF-Malware Detection: A Survey and Taxonomy of Current Techniques Cyber Threat Intelligence 2018
Unsupervised Features Extraction for Binary Similarity Using Graph Embedding Neural Networks 2018
The future of Cybersecurity in Italy: Strategic focus area 2018

ERC

  • PE6_2
  • PE6_5

KET

  • Big data & computing

Interessi di ricerca

Cybersecurity

The security of cyber physical systems represents today a field where countries are basing their future economic growth. Despite its importance, this is a field where the asymmetry between criminals and defendants is continuously growing: dozens of new attacks with severe impacts are discovered every day, while technologies and methodologies for securing target systems struggle to advance at an adequate pace. Further research is strongly needed to improve the ability of security operators to face more effectively and timely an ever increasing mass of attacks. My research in this context is focused on the study of new approaches to support security analysis in their reverse engineering efforts. Some of the solutions I investigate are based on the usage of language based models, the we exploit to automatically identify relevant characteristics in binary code.

Stream processing

In the last few years we are witnessing a huge growth in information production. IBM claims that "every day, we create 2.5 quintillion bytes of data - so much that 90% of the data in the world today has been created in the last two years alone". This apparently unrelenting growth is a consequence of several factors including the pervasiveness of social networks, the smartphone market success, the shift toward an “Internet of things” and the consequent widespread deployment of sensor networks. Big Data applications are typically characterized by the three V's: large volumes (up to petabytes) at a high velocity (intense data streams that must be analyzed in quasi real-time) with extreme variety (mix of structured and unstructured data). These large datasets are typically analyzed using either a batch approach (using well-known frameworks like Apache Hadoop) or with stream processing. This latter approach focussed on representing data as a real-time flow of events proved to be particularly advantageous for all those applications where data is continuously produced and must be analyzed on the fly. Complex event processing engines are used to apply complex detection and aggregation rules on intense data streams and output, as a result, new events. My research in this context is focussed in studying novel solutions for increasing the scalability and efficiency of stream processing systems as well as improving their reliability to faults.

Keywords

cybersecurity
Stream processing

Gruppi di ricerca

Gruppi di ricerca - Responsabile

© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma