@article {18594, title = {Time, Accuracy and Power Consumption Tradeoff in Mobile Malware Detection Systems}, journal = {Computers \& Security}, volume = {82}, year = {2019}, month = {05/2019}, pages = {314-328}, chapter = {314}, issn = {01674048}, doi = {https://doi.org/10.1016/j.cose.2019.01.001}, author = {Milosevic, Jelena and Malek, Miroslaw and Ferrante, Alberto} } @inbook {18529, title = {Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection}, booktitle = {Foundations and Practice of Security}, volume = {10723}, year = {2018}, month = {02/2018}, pages = {242-258}, publisher = {Springer International Publishing}, organization = {Springer International Publishing}, address = {Cham}, abstract = {Mobile ransomware is on the rise and effective defense from it is of utmost importance to guarantee security of mobile users{\textquoteright} data. Current solutions provided by antimalware vendors are signature-based and thus ineffective in removing ransomware and restoring the infected devices and files. Also, current state-of-the art literature offers very few solutions to effectively detecting and blocking mobile ransomware. Starting from these considerations, we propose a hybrid method able to effectively counter ransomware. The proposed method first examines applications to be used on a device prior to their installation (static approach) and then observes their behavior at runtime and identifies if the system is under attack (dynamic approach). To detect ransomware, the static detection method uses the frequency of opcodes while the dynamic detection method considers CPU usage, memory usage, network usage and system call statistics. We evaluate the performance of our hybrid detection method on a dataset that contains both ransomware and legitimate applications. Additionally, we evaluate the performance of the static and dynamic stand-alone methods for comparison. Our results show that although both static and dynamic detection methods perform well in detecting ransomware, their combination in a form of a hybrid method performs best, being able to detect ransomware with 100{\%} precision and having a false positive rate of less than 4{\%}.}, isbn = {978-3-319-75650-9}, doi = {https://doi.org/10.1007/978-3-319-75650-9_16}, author = {Ferrante, Alberto and Malek, Miroslaw and Martinelli, Fabio and Mercaldo, Francesco and Milosevic, Jelena}, editor = {Imine, Abdessamad and Fernandez, Jos{\'e} M. and Marion, Jean-Yves and Logrippo, Luigi and Garcia-Alfaro, Joaquin} } @article {18566, title = {Impact of Failure Prediction on Availability: Modeling and Comparative Analysis of Predictive and Reactive Methods}, journal = {IEEE Transactions on Dependable and Secure Computing}, year = {2018}, pages = {1-1}, abstract = {Predicting failures and acting proactively have a potential to improve availability as a correct prediction and a successful mitigation may bring a reward resulting in decrease of downtime and availability improvement. But, conversely, each incorrect prediction may introduce additional downtime (penalty). Therefore, depending on the quality of prediction and the system parameters, predictive fault-tolerance methods may improve or may degrade availability in comparison to the reactive ones. We first derive taxonomies of fault-tolerant techniques and policies to differentiate between reactive and proactive policies that are further classified as systematic and predictive. To evaluate whether a predictive policy improves availability or not, we derive an analytical model for availability quantification. We use Markov chains to extend steady-state availability equation to include: precision and recall, penalty and reward, mitigation success probability and potential failure rate increase due to the prediction load. We also derive A-measure to optimize failure prediction for increasing availability. In our conclusion, precision and recall have comparable impact on availability as changing MTTF and MTTR. To validate the model we also simulate and analyze availability of a virtualized server with exponential distribution of failure and repair rates.}, keywords = {Analytical models, availability, Computational modeling, failure, fault tolerance, Fault tolerant systems, Mathematical model, modeling, Optimization, prediction, predictive, Predictive models, proactive, Servers}, issn = {1545-5971}, doi = {10.1109/TDSC.2018.2806448}, author = {Kaitovi{\'c}, Igor and Malek, Miroslaw} } @conference {18530, title = {Time series kernel similarities for predicting Paroxysmal Atrial Fibrillation from ECGs}, booktitle = { IJCNN 2018 : International Joint Conference on Neural Networks}, year = {2018}, month = {07/2018}, publisher = {IEEE}, organization = {IEEE}, address = {Rio, Brazil}, author = {Bianchi, Filippo Maria and Livi, Lorenzo and Ferrante, Alberto and Milosevic, Jelena and Malek, Miroslaw} } @inbook {18466, title = {Malware Threats and Solutions for Trustworthy Mobile Systems Design}, booktitle = {Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment}, year = {2017}, pages = {149-167}, publisher = {Springer}, organization = {Springer}, edition = {First edition; 2016}, keywords = {malware, mobile systems, security metric, trusting}, doi = {https://doi.org/10.1007/978-3-319-44318-8_8}, author = {Milosevic, Jelena and Regazzoni, Francesco and Malek, Miroslaw} } @conference {18582, title = {Predictive Analytics: A Shortcut to Dependable Computing}, booktitle = {Software Engineering for Resilient Systems}, year = {2017}, publisher = {Springer International Publishing}, organization = {Springer International Publishing}, address = {Cham}, abstract = {The paper lists three major issues: complexity, time and uncertainty, and identifies dependability as the permanent challenge. In order to enhance dependability, the paradigm shift is proposed where focus is on failure prediction and early malware detection. Failure prediction methodology, including modeling and failure mitigation, is presented and two case studies (failure prediction for computer servers and early malware detection) are described in detail. The proposed approach, using predictive analytics, may increase system availability by an order of magnitude or so.}, isbn = {978-3-319-65948-0}, author = {Malek, Miroslaw}, editor = {Romanovsky, Alexander and Troubitsyna, Elena A.} } @inbook {18521, title = {Runtime Classification of Mobile Malware for Resource-constrained Devices}, booktitle = {Lecture Notes in Communications in Computer and Information Science}, volume = {764}, year = {2017}, pages = {195-215}, publisher = { Springer International Publishing AG}, organization = { Springer International Publishing AG}, doi = {https://doi.org/10.1007/978-3-319-67876-4_10}, author = {Milosevic, Jelena and Malek, Miroslaw and Ferrante, Alberto} } @conference {18485, title = {Evaluating the Impact of Environmental Factors on Physically Unclonable Functions}, booktitle = {International Symposium on Field-Programmable Gate Arrays FPGA 2016}, series = {Proceedings of the 2016 ACM/SIGDA}, year = {2016}, month = {02/2016}, pages = {279}, publisher = {ACM New York, NY, USA}, organization = {ACM New York, NY, USA}, address = {Monterey, CA, USA}, abstract = {Fabrication process introduces some inherent variability to the attributes of transistors (in particular length, widths, oxide thickness). As a result, every chip is physically unique. Physical uniqueness of microelectronics components can be used for multiple security applications. Physically Unclonable Functions (PUFs) are built to extract the physical uniqueness of microelectronics components and make it usable for secure applications. However, the microelectronics components used by PUFs designs suffer from external, environmental variations that impact the PUF behavior. Variations of temperature gradients during manufacturing can bias the PUF responses. Variations of temperature or thermal noise during PUF operation change the behavior of the circuit, and can introduce errors in PUF responses. Detailed knowledge of the behavior of PUFs operating over various environmental factors is needed to reliably extract and demonstrate uniqueness of the chips. In this work, we present a detailed and exhaustive analysis of the behavior of two PUF designs, a ring oscillator PUF and a timing path violation PUF. We have implemented both PUFs using FPGA fabricated by Xilinx, and analyzed their behavior while varying temperature and supply voltage. Our experiments quantify the robustness of each design, demonstrate their sensitivity to temperature and show the impact which supply voltage has on the uniqueness of the analyzed PUFs. }, isbn = {978-1-4503-3856-1}, doi = {10.1145/2847263.2847308}, url = {http://doi.acm.org/10.1145/2847263.2847308}, author = {Bellon, Sebastien and Favi, Claudio and Malek, Miroslaw and Macchetti, Marco and Regazzoni, Francesco} } @article {18455, title = {A Framework for Disturbance Analysis in Smart Grids by Fault Injection}, journal = {Springer Journal on "Computer Science - Research and Development"}, year = {2016}, month = {09/2016}, abstract = {With growing complexity of electric power systems, a total number of disturbances is expected to increase. Analyzing these disturbances and understanding grid{\textquoteright}s behavior, when under a disturbance, is a pre-requisite for designing methods for boosting grid{\textquoteright}s stability. The main obstacle to the analysis is a lack of relevant data that are publicly available. In this paper, we design and implement a framework for emulation of grid disturbances by employing simula-tion and fault-injection techniques. We also present a case study on generating voltage sag related data. A foreseen usage of the framework considers mainly prototyping, root-cause analysis and design and comparison of methods for disturbance detection and prediction. }, issn = {1865-2042}, doi = {10.1007/s00450-016-0313-8}, url = {http://dx.doi.org/10.1007/s00450-016-0313-8}, author = {Kaitovi{\'c}, Igor and Obradovi{\'c}, Filip and Lukovi{\'c}, Slobodan and Malek, Miroslaw} } @conference {18459, title = {A Friend or a Foe? Detecting Malware Using Memory and CPU Features}, booktitle = {SECRYPT 2016, 13th International Conference on Security and Cryptography}, year = {2016}, month = {07/2016}, publisher = {SciTePress Digital Library}, organization = {SciTePress Digital Library}, address = {Lisbon, Portugal}, author = {Milosevic, Jelena and Malek, Miroslaw and Ferrante, Alberto} } @conference {18461, title = {MalAware: Effective and Efficient Run-time Mobile Malware Detector}, booktitle = {The 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2016)}, year = {2016}, month = {08/2016}, publisher = {IEEE Computer Society Press}, organization = {IEEE Computer Society Press}, address = {Auckland, New Zealand}, author = {Milosevic, Jelena and Ferrante, Alberto and Malek, Miroslaw} } @conference {18503, title = {A Methodology for Proactive Maintenance of Uninterruptible Power Supplies}, booktitle = {Latin-American Symposium on Dependable Computing (LADC2016) - Workshop on Dependability in Evolving Systems (WDES)}, year = {2016}, month = {10/2016}, address = {Cali, Colombia}, abstract = {We propose a methodology for proactive maintenance of Uninterruptible Power Supply (UPS) devices based on online health-status monitoring and application of data analytics for prediction of UPS components{\textquoteright} failures. The goals of the work are (i) improvement of reliability of UPS devices by ensuring prompt action prior to a failure of a component, and (ii) provision of more cost-effective maintenance by servicing the device only when required instead of periodically. Improving reliability of UPS{\textquoteright}es also enhances dependability of critical infrastructures that require high quality power supply.}, author = {Lukovi{\'c}, Slobodan and Kaitovi{\'c}, Igor and Lecuona, Gerardo and Malek, Miroslaw} } @conference {18454, title = {Optimizing Failure Prediction to Maximize Availability}, booktitle = {13th IEEE International Conference on Autonomic Computing (ICAC)}, year = {2016}, month = {07/2016}, address = {W{\"u}rzburg, Germany}, abstract = {Availability of autonomous systems can be enhanced with self-monitoring and fault-tolerance methods based on failures prediction. With each correct prediction, proactive actions may be taken to prevent or to mitigate a failure. On the other hand, incorrect predictions will introduce additional downtime associated with the overhead of a proactive action that may decrease availability. The total effect on availability will depend on the quality of prediction (measured with precision and recall), the overhead of proactive actions (penalty), and the benefit of proactive actions when prediction is correct (reward). In this paper, we quantify the impact of failure prediction and proactive actions on steady-state availability. Furthermore, we provide guidelines for optimizing failure prediction to maximize availability by selecting a proper precision and recall trade-off with respect to penalty and reward. A case study to demonstrate the approach is also presented.}, author = {Kaitovi{\'c}, Igor and Malek, Miroslaw} } @conference {18490, title = {Topology Optimization of Wireless Localization Networks}, booktitle = {European Wireless 2016 }, year = {2016}, month = {05/2016}, address = {Oulu, Finland}, abstract = {This paper addresses topology optimization problem for an ultra wide band (UWB) localization network, where trilateration is used to obtain the target position based on its distances from fixed and known anchors. Our goal is to minimize the number of anchors needed to localize a target, while keeping the localization uncertainty lower than a given threshold in an area of arbitrary shape with obstacles. Our propagation model accounts for the presence of line of sight (LOS) between nodes, while geometric dilution of precision (GDoP) is used to express the localization error introduced by trilateration. We propose two integer linear programming formulations to solve the problem. To handle the problems of large sizes, we use the greedy placement with pruning heuristic. We test our solutions through simulation and show that the integer linear programming is appropriate to handle reasonably sized problems, and the heuristic achieves the results, in terms of the number of anchors placed, within less than 2\% of optimum on average. }, keywords = {localization network, propagation model, topology optimization, ultra wide band, wireless protocols, wireless sensor networks}, author = {Bala{\'c}, Katarina and Akhmedov, Murodzhon and Prevostini, Mauro and Malek, Miroslaw} } @conference {18505, title = {Trojan Families Identification Using Dynamic Features and Low Complexity Classifiers}, booktitle = {24th EICAR Annual Conference 2016 "Trustworthiness in IT Security Products"}, year = {2016}, month = {10/2016}, publisher = {EICAR}, organization = {EICAR}, address = {Nuremberg, Germany}, author = {Milosevic, Jelena and Ferrante, Alberto and Malek, Miroslaw} } @conference {18385, title = {What Does the Memory Say? Towards the most indicative features for efficient malware detection}, booktitle = {CCNC 2016, The 13th Annual IEEE Consumer Communications \& Networking Conference}, year = {2016}, month = {01/2016}, publisher = {IEEE Communication Society}, organization = {IEEE Communication Society}, address = {Las Vegas, NV, USA}, author = {Milosevic, Jelena and Ferrante, Alberto and Malek, Miroslaw} } @conference {18390, title = {Can we Achieve both Privacy Protection and Efficient Malware Detection on Smartphones?}, booktitle = {1st Interdisciplinary Cyber Research Workshop 2015}, year = {2015}, month = {07/2015}, publisher = {Tallinn University of Technology}, organization = {Tallinn University of Technology}, address = {Tallin, Estona}, url = {http://cybercentre.cs.ttu.ee/wp/wp-content/uploads/2015/02/ICR_2015_proceedings.pdf}, author = {Milosevic, Jelena and Ferrante, Alberto and Malek, Miroslaw} } @misc {18391, title = {A General Practitioner or a Specialist for Your Infected Smartphone?}, journal = {36th IEEE Symposium on Security and Privacy }, year = {2015}, month = {05/2015}, publisher = {IEEE Computer Society Technical Committee on Security and Privacy}, address = {San Jose, CA, USA}, abstract = {With explosive growth in the number of mobile devices, the mobile malware is rapidly spreading as well, and the number of encountered malware families is increasing. Existing solutions, which are mainly based on one malware detector running on the phone or in the cloud, are no longer effective. Main problem lies in the fact that it might be impossible to create a unique mobile malware detector that would be able to detect different malware families with high accuracy, being at the same time lightweight enough not to drain battery quickly and fast enough to give results of detection promptly. The proposed approach to mobile malware detection is analogous to general practitioner versus specialist approach to dealing with a medical problem. Similarly to a general practitioner that, based on indicative symptoms identifies potential illnesses and sends the patient to an appropriate specialist, our detection system distinguishes among symptoms representing different malware families and, once the symptoms are detected, it triggers specific analyses. A system monitoring application operates in the same way as a general practitioner. It is able to distinguish between different symptoms and trigger appropriate detection mechanisms. As an analogy to different specialists, an ensemble of detectors, each of which specifically trained for a particular malware family, is used. The main challenge of the approach is to define representative symptoms of different malware families and train detectors accordingly to them. The main goal of the poster is to foster discussion on the most representative symptoms of different malware families and to discuss initial results in this area obtained by using Malware Genome project dataset.}, keywords = {Android, feature selection, malware detection, PCA, security}, url = {http://www.ieee-security.org/TC/SP2015/posters/paper_16.pdf}, author = {Milosevic, Jelena and Ferrante, Alberto and Malek, Miroslaw} } @conference {18380, title = {Optimizing Sensor Nodes Placement for Fault-tolerant Trilateration-based Localization}, booktitle = {IEEE Pacific Rim International Symposium on Dependable Computing (PRDC)}, year = {2015}, month = {11/2015}, address = {Zhangjiajie, China}, author = {Bala{\'c}, Katarina and Prevostini, Mauro and Malek, Miroslaw} } @conference {18379, title = {Proactive Failure Management in Smart Grids for Improved Resilience (A Methodology for Failure Prediction and Mitigation)}, booktitle = {IEEE GLOBECOM SmartGrid Resilience (SGR) Workshop}, year = {2015}, month = {12/2015}, address = {San Diego, CA, USA}, abstract = {A gradual move in the electric power industry towards Smart Grids brings several challenges to the system operation such as preserving its resilience and ensuring security. As the system complexity grows and a number of failures increases, the need for grid management paradigm shift from reactive to proactive is apparent and can be realized by employing advanced monitoring instruments, data analytics and prediction methods. In order to improve resilience of the Smart Grid and to contribute to efficient system operation, we present a blueprint of a comprehensive methodology for proactive failure management that may also be applied to manage other types of disturbances and undesirable changes. The methodology is composed of three main steps: (i) continuous monitoring of the most indicative features, (ii) prediction of failures and (iii) their mitigation. The approach is complementary to the existing ones that are mainly based on fast detection and localization of grid disturbances, and reactive corrective actions.}, keywords = {Failure Prediction, Proactive Management, Resilience, security, smart grid, Synchrophasor}, author = {Kaitovi{\'c}, Igor and Lukovi{\'c}, Slobodan and Malek, Miroslaw} } @conference {18378, title = {Unifying Dependability of Critical Infrastructures: Electric Power System and ICT (Concepts, Figures of Merit and Taxonomy)}, booktitle = {IEEE Pacific Rim International Symposium on Dependable Computing (PRDC)}, year = {2015}, month = {11/2015}, address = {Zhangjiajie, China}, abstract = {With Smart Grids efficiency of the electric power delivery service can be significantly increased by using advanced ICT infrastructure. The looming danger of merging two critical infrastructures, ICT and electric power, is that dependability may be compromised due to interdependencies and different approaches to dependability in the two communities. This calls for a unified approach to dependability which may be achieved by viewing Smart Grids as cyber-physical systems. We analyze and compare definitions and figures of merit used in ICT and electric power systems{\textquoteright} communities to provide the basis for dependability analysis of Smart Grids. We propose a taxonomy of faults for Smart Grids by examining a large set of previous power system outages. Our work relies on the analysis of relevant events from the past in an attempt to understand present dependability state of Smart Grids and pave the way for proactive grid management.}, keywords = {Critical Infrastructures, Cyber-Physical, Dependability, Fault Taxonomy, smart grid}, author = {Kaitovi{\'c}, Igor and Lukovi{\'c}, Slobodan and Malek, Miroslaw} } @conference {18464, title = {Embedded Systems Education: Job Market Expectations}, booktitle = {Workshop on Embedded and Cyber-Physical Systems Education (WESE) }, year = {2014}, month = {10/2014}, publisher = {ACM}, organization = {ACM}, address = {New Delhi, India}, abstract = {In the fifteen years since the first Embedded Systems Design Master studies were proposed the embedded systems world has radically changed. The spectrum of application areas has increased beyond any expectation, and the increasing presence of embedded systems in the physical world has led to "cyber-physical systems." Devices tend to become a commodity in many cases, while sensors and IPs acquire a larger share of the market. The whole industrial ecosystem is changing as well, with "application" companies becoming increasingly present and SMEs emerging as major players. It becomes mandatory to reconsider the competences and capacities that should be provided in a Master of Science course oriented to Embedded Systems Design, so as to meet new and diverse requests that come from job market and prospective employers. Within the frame of the Nano-Tera Swiss Federal program (www.nano-tera.ch), the educational project Future Embedded Systems Education (FESTE) aimed at identifying requests coming from the job market, so as to outline the renewed professional profile for young Embedded Systems Designers. The results indicate that programming, networking, real time and system architecture know-how combined with soft skills such as teamwork and communication are in demand and frequently come under disguised names such as automation or control engineering.}, keywords = {Cyber-Physical Systems Education, embedded systems, Nano Tera program}, isbn = {978-1-4503-3090-9}, url = {http://doi.acm.org/10.1145/2829957.2829961}, author = {Sami, Mariagiovanna and Malek, Miroslaw and Bondi, Umberto and Regazzoni, Francesco} } @conference {18165, title = {ExCovery {\textendash} A Framework for Distributed System Experiments and a Case Study of Service Discovery}, booktitle = {28th International Parallel \& Distributed Processing Symposium, Workshops and Phd Forum (IPDPSW)}, year = {2014}, month = {05/2014}, publisher = {IEEE Computer Society}, organization = {IEEE Computer Society}, address = {Phoenix, AZ, USA}, abstract = {Experiments are a fundamental part of science. They are needed when the system under evaluation is too complex to be analytically described and they serve to empirically validate hypotheses. This work presents the experimentation framework ExCovery for dependability analysis of distributed processes. It provides concepts that cover the description, execution, measurement and storage of experiments. These concepts foster transparency and repeatability of experiments for further sharing and comparison. ExCovery has been tried and refined in a manifold of dependability related experiments during the last two years. A case study is provided to describe service discovery as experiment process. A working prototype for IP networks runs on the Distributed Embedded System (DES) wireless testbed at the Freie Universit{\"a}t Berlin.}, keywords = {Distributed Systems, Experiment Framework, Experiments, Tool Description}, isbn = {978-1-4799-4116-2/14}, doi = {10.1109/IPDPSW.2014.147}, url = {http://andreas-dittrich.eu/2014/03/excovery}, author = {Dittrich, Andreas and Wanja, Stefan and Malek, Miroslaw} } @inbook {18024, title = {Modeling Responsiveness of Decentralized Service Discovery in Wireless Mesh Networks}, booktitle = {MMB \& DFT}, series = {Lecture Notes in Computer Science}, volume = {8376}, year = {2014}, pages = {88-102}, publisher = {Springer International Publishing Switzerland}, organization = {Springer International Publishing Switzerland}, abstract = {In modern service networks, discovery plays a crucial role as a layer where providing instances of a given service can be published and enumerated. Since successful discovery is mandatory for service usage, comprehensive service dependability assessment needs to incorporate the dependability of the discovery layer. This work focuses on the responsiveness of the discovery layer, the probability to operate successfully within a deadline, even in the presence of faults. It proposes a hierarchy of stochastic models for decentralized discovery and uses it to describe the discovery of a single service using three well-known discovery protocols: domain name system based service discovery (DNS-SD), simple service discovery protocol (SSDP) and service location protocol (SLP). Further, a methodology to use the model hierarchy in wireless mesh networks is introduced. Given a pair service requester and provider, a discovery protocol and a deadline, it estimates packet loss probabilities and transmission time distributions for each link on the communication paths between the pair, generates specific model instances and calculates the expected responsiveness. Finally, the paper introduces a new metric, the expected responsiveness distance d_er to estimate the maximum distance from a provider where requesters are still able to discover it with a required responsiveness. The models and their methodology are demonstrated using monitoring data from the distributed embedded systems (DES) testbed at Freie Universit{\"a}t Berlin. It is shown how the responsiveness and d_er of the protocols change depending on the position of requester and provider and the overall link quality in the network.}, keywords = {fault tolerance, Markov Models, Real time systems, Responsiveness, Service Discovery, Wireless mesh networks}, isbn = {978-3-319-05358-5}, issn = {0302-9743}, doi = {10.1007/978-3-319-05359-2_7}, url = {http://andreas-dittrich.eu/2013/12/modeling-responsiveness-of-decentralized-service-discovery-in-wireless-mesh-networks}, author = {Dittrich, Andreas and Lichtblau, Bj{\"o}rn and Rezende, Rafael and Malek, Miroslaw}, editor = {Fischbach, K. and Krieger, U. R.} } @conference {18206, title = {A Resource-optimized Approach to Efficient Early Detection of Mobile Malware}, booktitle = {3rd International Workshop on Security of Mobile Applications - IWSMA 2014}, year = {2014}, month = {09/2014}, address = {Fribourg, Switzerland}, author = {Milosevic, Jelena and Dittrich, Andreas and Ferrante, Alberto and Malek, Miroslaw} } @conference {18232, title = {Responsiveness of Service Discovery in Wireless Mesh Networks}, booktitle = {20th Pacific Rim International Symposium on Dependable Computing (PRDC)}, year = {2014}, month = {11/2014}, publisher = {IEEE Computer Society}, organization = {IEEE Computer Society}, address = {Singapore}, abstract = {Service Discovery (SD) is an integral part of service networks. Before a service can be used, it needs to be discovered successfully. Comprehensive service dependability analysis thus needs to include the SD process. As a time-critical operation, an important property of SD is responsiveness: The probability of successful discovery within a deadline, even in the presence of faults. This is especially true for dynamic networks with complex fault behavior such as wireless networks. This work evaluates the responsiveness of decentralized SD in wireless mesh networks. For this reason, the experiment framework ExCovery has been employed, which provides a unified description, execution, measurement and storage of experiments. ExCovery runs on the Distributed Embedded System (DES) wireless testbed at Freie Universit{\"a}t Berlin. We present and discuss the results of the experiments and show how responsiveness is affected by the position and number of requester and providers as well as the load in the network. The results clearly demonstrate that in all but the most favorable conditions, the configurations of current SD protocols struggle to achieve a high responsiveness.}, keywords = {Experiments, Responsiveness, Service Discovery, Wireless mesh networks, Zeroconf}, doi = {10.1109/PRDC.2014.38}, url = {http://andreas-dittrich.eu/2014/06/prdc2014}, author = {Dittrich, Andreas and Herrera, Daniel Solis and Coto, Pablo and Malek, Miroslaw} } @conference {18227, title = {Risk Assessment of Atrial Fibrillation: a Failure Prediction Approach}, booktitle = {41st Computing in Cardiology Conference (CinC)}, year = {2014}, month = {09/2014}, publisher = {IEEE Computer Society}, organization = {IEEE Computer Society}, address = {Cambridge, MA, USA}, abstract = {We present a methodology for identifying patients who have experienced Paroxysmal Atrial Fibrillation (PAF) among a given subjects population. Our work is intended as an initial step towards the design of an unobtrusive system for concurrent detection and monitoring of chronic cardiac conditions. Our methodology comprises two stages: off-line training and on-line analysis. During training the most significant features are selected using machine-learning methods, without relying on a manual selection based on previous knowledge. Analysis is based on two phases: feature extraction and detection of PAF patients. Light-weight algorithms are employed in the feature extraction phase, allowing the on-line implementation of this step on wearable and resource-constrained sensor nodes. The detection phase employs techniques borrowed from the field of failure prediction. While these algorithms have found extensive applications in diverse scenarios, their application to automated cardiac analysis has not been sufficiently investigated. Obtained results, in terms of performance, are comparable to similar efforts in the field. Nonetheless, the proposed method employs computationally simpler and more efficient algorithms, which are compatible with the computational constraints of state-of-the-art body sensor nodes.}, url = {http://andreas-dittrich.eu/2014/06/risk-assessment-of-atrial-fibrillation-a-failure-prediction-approach}, author = {Milosevic, Jelena and Dittrich, Andreas and Ferrante, Alberto and Malek, Miroslaw and Rojas Quiros, Camilo and Braojos, Rub{\'e}n and Ansaloni, Giovanni and Atienza, David} } @inbook {17996, title = {Self-Organizing Real-Time Services in Mobile Ad Hoc Networks}, booktitle = {Self-Organization in Embedded Real-Time Systems}, year = {2013}, pages = {55-74}, publisher = {Springer New York}, organization = {Springer New York}, isbn = {978-1-4614-1968-6}, doi = {10.1007/978-1-4614-1969-3_3}, url = {http://dx.doi.org/10.1007/978-1-4614-1969-3_3}, author = {Kakuda, Yoshiaki and Ohta, Tomoyuki and Malek, Miroslaw}, editor = {Higuera-Toledano, Teresa and Brinkschulte, Uwe and Rettberg, Achim} } @conference {17846, title = {User-Perceived Instantaneous Service Availability Evaluation}, booktitle = {19th Pacific Rim International Symposium on Dependable Computing (PRDC)}, year = {2013}, month = {12/2013}, publisher = {IEEE Computer Society}, organization = {IEEE Computer Society}, address = {Vancouver, British Columbia, Canada}, abstract = {Today{\textquoteright}s businesses rely ever more on dependable service provision deployed on information and communications technology (ICT) infrastructures. Service dependability is highly influenced by the individual infrastructure component properties. Combining these properties for consistent dependability analysis is challenging as every service requester might use a different set of components during service usage, constituting the user-perceived view on a service. This paper presents a methodology to evaluate user-perceived instantaneous service availability. It uses three input models: (1) The ICT infrastructure, with failure rates, repair rates and deployment times of all components, (2) an abstract description of complex hierarchical services, (3) a mapping that contains concrete ICT components for the service pair requester and provider, as well as their existing replicas, and a duration of usage. The methodology then automatically generates an availability model from those parts of the ICT infrastructure needed during provision for the specified pair. To calculate instantaneous availability, the age of the ICT components, the order and time of their usage during service provision are taken into account. The methodology supports generation of different availability models, we demonstrate this by providing reliability block diagrams and fault-trees. We demonstrate the feasibility of the methodology by applying it to parts of the network infrastructure of Universit{\`a} della Svizzera italiana, Switzerland.}, keywords = {availability, Client-server systems, Distributed computing, fault tolerance, modeling}, doi = {10.1109/PRDC.2013.49}, url = {http://andreas-dittrich.eu/2013/08/user-perceived-instantaneous-service-availability-evaluation}, author = {Rezende, Rafael and Dittrich, Andreas and Malek, Miroslaw} } @conference {17994, title = {Securability: the Key Challenge for Autonomic and Trusted Computing}, booktitle = {IEEE International Conference on Ubiquitous Intelligence Computing / International Conference on Autonomic Trusted Computing (UIC/ATC)}, year = {2012}, month = {03/2012}, edition = {9}, author = {Malek, Miroslaw} } @conference {17995, title = {NPART - node placement algorithm for realistic topologies in wireless multihop network simulation}, booktitle = {Proceedings of the 2nd International Conference on Simulation Tools and Techniques}, year = {2009}, publisher = {ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)}, organization = {ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)}, address = {ICST, Brussels, Belgium, Belgium}, keywords = {node placement, simulation, topology generation, wireless multihop networks}, isbn = {978-963-9799-45-5}, doi = {10.4108/ICST.SIMUTOOLS2009.5669}, url = {http://dx.doi.org/10.4108/ICST.SIMUTOOLS2009.5669}, author = {Milic, Bratislav and Malek, Miroslaw} }