6. Information Technology Panorama
6
Robotics
&& AI
Computer
Architecture
Cloud
Security &&
Reliable
Systems
Software
Engineering
Compilers
Data Base
Human
Computer
Interaction
Embedded
Systems
&& IoT
Operating
Systems
Data
Analysis
7. NECSTLab: Research Focus
7
Robotics
&& AI
Computer
Architecture
Cloud
Security &&
Reliable
Systems
Software
Engineering
Compilers
Data Base
Human
Computer
Interaction
Embedded
Systems
&& IoT
Operating
Systems
Data
Analysis
9. • Malware analysis
– Static and dynamic analysis for bridging the semantic gap
– Malware naming conventions are ineffective
• Bank fraud detection
– Anomaly detection
– User profiling
• Cyber-physical systems security
– Security analysis of industrial robots control
• Web security
– Large-scale security measurements of popular web services
deployed in the real world
– Security of social networks
System Security
Research Lines
Prof. Stefano Zanero
stefano.zanero@polimi.it
9
10. • DReAMS
– To discover the world of FPGA-based systems
– Design and implementation of reconfigurable computing: from architectural
aspect to CAD development
– How to use CS to “speedup/improve” biomed applications
• ORCA
– Unleashed computer architecture and operating systems
– From embedded to HPC computing systems, focusing on computer
architectures, OS and monitoring infrastructures.
• STeEL
– To make smart ambient coming true!
– On how to make heterogeneous components to coexist to improve quality of life
and comfort while minimizing power and energy consumption
– Emotional and Physical Comfort
– Biometric Human recognition
10
DReAMS
Computer Architecture
Research Lines
13. Computer Architecture and OS
Computer Architecture
Heterogeneous systems
Autonomic computing
Operating systems
Runtime adaptation
Monitoring infrastructures
14. Smart Technologies
Easy Life
Energy Efficiency
Building Programming Interfaces
IoT and Wireless Sensors Networks
Emotional and Physical comfort
Phsycological models
Fitness tracker and smart watch
15. 15
DReAMS
• ShieldFS: The Last Word in
Ransomware Resilient Filesystems,
Andrea Continella
• Self-adaptive container monitoring with performance-
aware Load-Shedding policies, Rolando Brondolin
• Exploit FPGA-based Systems from Data Science High
Level Languages, Luca Stornaiuolo
• Fast Algorithms for Quantized Convolutional Neural
Networks, Alessandro Pappalardo
MALWARE
ANALYSIS
DReAMS
DReAMS