Risk taxonomy, mitigation, and assessment benchmarks of large language model systems

T Cui, Y Wang, C Fu, Y Xiao, S Li, X Deng, Y Liu… - arXiv preprint arXiv …, 2024 - arxiv.org
Large language models (LLMs) have strong capabilities in solving diverse natural language
processing tasks. However, the safety and security issues of LLM systems have become the …

A comprehensive survey on smartnics: Architectures, development models, applications, and research directions

EF Kfoury, S Choueiri, A Mazloum, A AlSabeh… - IEEE …, 2024 - ieeexplore.ieee.org
The end of Moore's Law and Dennard Scaling has slowed processor improvements in the
past decade. While multi-core processors have improved performance, they are limited by …

Point cloud analysis for ML-based malicious traffic detection: Reducing majorities of false positive alarms

C Fu, Q Li, K Xu, J Wu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
As an emerging security paradigm, machine learning (ML) based malicious traffic detection
is an essential part of automatic defense against network attacks. Powered by dedicated …

Enhancing Network Visibility and Security with Advanced Port Scanning Techniques

R Abu Bakar, B Kijsirikul - Sensors, 2023 - mdpi.com
Network security is paramount in today's digital landscape, where cyberthreats continue to
evolve and pose significant risks. We propose a DPDK-based scanner based on a study on …

Synergy: A smartnic accelerated 5G dataplane and monitor for mobility prediction

S Panda, KK Ramakrishnan… - 2022 IEEE 30th …, 2022 - ieeexplore.ieee.org
The 5G user plane function (UPF) is a critical inter-connection point between the data
network and cellular network infrastructure. It governs the packet processing performance of …

Network monitoring on multi-pipe switches

M Chiesa, FL Verdi - Proceedings of the ACM on Measurement and …, 2023 - dl.acm.org
Programmable switches have been widely used to design network monitoring solutions that
operate in the fast data-plane level, eg, detecting heavy hitters, super-spreaders, computing …

SonarAuth: Using Around Device Sensing to Improve Smartwatch Behavioral Biometrics

J Kim, J Park, I Oakley - Adjunct Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Smartwatches are used by millions of people for applications in health, finance, and
communication. As the computational power and range of applications supported by these …

Packet Processing Algorithm Identification using Program Embeddings

S VenkataKeerthy, Y Andaluri, S Dey, R Shah… - Proceedings of the 6th …, 2022 - dl.acm.org
To keep up with the network speeds, many recent works propose to offload network
functions to SmartNICs. The process involves identifying packet-processing algorithms in a …

Poster: A Fast Monitor for Slow Network Attacks

C Wei, S Tu, T Hasegawa, Y Koizumi… - 2024 IEEE Cloud …, 2024 - ieeexplore.ieee.org
Recent work has demonstrated how programmable switches can effectively detect attack
traffic, such as denial-of-service attacks in the midst of high-volume network traffic. However …

[PDF][PDF] Towards Optimizing the Edge-to-Cloud Continuum Resource Allocation.

IF Capeletti, AG de Castro, DC Temp, PSS de Souza… - CLOSER, 2023 - scitepress.org
The IT community has witnessed a transition towards the cooperation of two major
paradigms, Cloud Computing and Edge Computing, paving the way to a Cloud Continuum …