Resilient Computing Lab
Dipartimento di Matematica e Informatica (DiMaI) Tommaso Zoppi
tommaso.zoppi@unifi.it
http://rcl.dsi.unifi.it
RCL Group members Paolo Lollini Andrea Bondavalli Researcher Full - - PowerPoint PPT Presentation
R esilient C omputing L ab Dipartimento di Matematica e Informatica (DiMaI) Tommaso Zoppi tommaso.zoppi@unifi.it http://rcl.dsi.unifi.it RCL Group members Paolo Lollini Andrea Bondavalli Researcher Full Professor Head of RCL Andrea
Dipartimento di Matematica e Informatica (DiMaI) Tommaso Zoppi
tommaso.zoppi@unifi.it
http://rcl.dsi.unifi.it
R e s i l i e n t C o m p u t i n g L a b
RCL Group members
Andrea Bondavalli Full Professor Head of RCL Paolo Lollini Researcher Andrea Ceccarelli Researcher Enrico Schiavone PhD Student Tommaso Zoppi Post-Doc Mohamad Gharib Post-Doc
R e s i l i e n t C o m p u t i n g L a b
Research Projects since 2016 – funders and timeline
TEN TENACE: Italian PRIN 2010 ADV ADVANCE: : H2020-MSCA-RISE-2018 Co Conce certo to: Artemis 2012 AM AMADEOS: S: ICT-FP7-610535 DEV DEVASS SSES ES: IRSES-GA-2013-612569 IR IREN ENE: E: JPI-URBAN EUROPE SIST SISTER ER: Tuscany FESR TOS TOSCA-FI: I: Tuscany FAR-FAS
R e s i l i e n t C o m p u t i n g L a b
Main expertise on dependable and secure systems and infrastructures Design Val alidation an and Assessment t
Stochastic modeling Threats analysis and validation Robustness and security testing Architectures for dependable, secure, real- time systems Security, intrusion detection/tolerance Monitoring, analysis, diagnosis
R e s i l i e n t C o m p u t i n g L a b
Research Activities – Design
Statistical anomaly-based fault-detection
detection by analyzing key system variables
Engineering (MDE) techniques
engineering languages (e.g., UML)
Stochastic Petri Nets models
properties at UML level
R e s i l i e n t C o m p u t i n g L a b
Research Activities – Assessment
Stochastic modeling and evaluation of systems, Critical Infrastructures, protocols, algorithms
Securi rity Models considering different At Attack Ex Exec ecution paths and different Ad Adversary Pr Profi files, for quantifying the Impact of Malicious Attacks.
Analysis of system/assets threats and identification of countermeasures
logical description of the system
support maintenance procedures
R e s i l i e n t C o m p u t i n g L a b
Interactions with Companies
–Ex-spinoff of UNIFI
–Devising Generic Fault-Tolerant Architectures, including prototypes of key modules and components –Cooperation with other universities
–Safety Critical Systems –Fault-Tolerant Architectures –V&V