Titolo | Pubblicato in | Anno |
---|---|---|
Exploiting user feedback for online filtering in event-based systems | FUTURE GENERATION COMPUTER SYSTEMS | 2017 |
Data Streaming and its Application to Stream Processing: Tutorial | Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems | 2017 |
Malware Family Identification with BIRCH Clustering | 2017 International Carnahan Conference on Security Technology (ICCST) | 2017 |
Android malware family classification based on resource consumption over time | Proceedings of the 2017 12th International Conference on Malicious and Unwanted Software, MALWARE 2017 | 2017 |
Exploiting user feedback for online Filtering in event-based systems | Proceedings of the ACM Symposium on Applied Computing | 2016 |
LCBM: A fast and lightweight collaborative filtering algorithm for binary ratings | THE JOURNAL OF SYSTEMS AND SOFTWARE | 2016 |
Load-Aware shedding in stream processing systems | DEBS '16 Proceedings of the 10th ACM International Conference on Distributed and Event-based Systems | 2016 |
Automatic Invariant Selection for Online Anomaly Detection | Computer Safety, Reliability, and Security | 2016 |
Micro-accounting for optimizing and saving energy in smart buildings | Advanced Information Systems Engineering Workshops | 2016 |
Online Scheduling for Shuffle Grouping in Distributed Stream Processing Systems | Middleware '16 Proceedings of the 17th International Middleware Conference | 2016 |
High frequency batch-oriented computations over large sliding time windows | FUTURE GENERATION COMPUTER SYSTEMS | 2015 |
Efficient key grouping for near-optimal load balancing in stream processing systems | DEBS '15 The 9th ACM International Conference on Distributed Event-Based Systems | 2015 |
Efficient notification ordering for geo-distributed pub/sub systems | IEEE TRANSACTIONS ON COMPUTERS | 2015 |
NIRVANA: A Non-intrusive Black-Box Monitoring Framework for Rack-Level Fault Detection | 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC) | 2015 |
HDRF: Stream-based partitioning for power-law graphs | Proceedings of the 24th ACM International on Conference on Information and Knowledge Management | 2015 |
The security of cyber physical systems represents today a field where countries are basing their future economic growth. Despite its importance, this is a field where the asymmetry between criminals and defendants is continuously growing: dozens of new attacks with severe impacts are discovered every day, while technologies and methodologies for securing target systems struggle to advance at an adequate pace. Further research is strongly needed to improve the ability of security operators to face more effectively and timely an ever increasing mass of attacks. My research in this context is focused on the study of new approaches to support security analysis in their reverse engineering efforts. Some of the solutions I investigate are based on the usage of language based models, the we exploit to automatically identify relevant characteristics in binary code.
Stream processing
In the last few years we are witnessing a huge growth in information production. IBM claims that "every day, we create 2.5 quintillion bytes of data - so much that 90% of the data in the world today has been created in the last two years alone". This apparently unrelenting growth is a consequence of several factors including the pervasiveness of social networks, the smartphone market success, the shift toward an “Internet of things” and the consequent widespread deployment of sensor networks. Big Data applications are typically characterized by the three V's: large volumes (up to petabytes) at a high velocity (intense data streams that must be analyzed in quasi real-time) with extreme variety (mix of structured and unstructured data). These large datasets are typically analyzed using either a batch approach (using well-known frameworks like Apache Hadoop) or with stream processing. This latter approach focussed on representing data as a real-time flow of events proved to be particularly advantageous for all those applications where data is continuously produced and must be analyzed on the fly. Complex event processing engines are used to apply complex detection and aggregation rules on intense data streams and output, as a result, new events. My research in this context is focussed in studying novel solutions for increasing the scalability and efficiency of stream processing systems as well as improving their reliability to faults.
© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma