Risk taxonomy, mitigation, and assessment benchmarks of large language model systems
Large language models (LLMs) have strong capabilities in solving diverse natural language
processing tasks. However, the safety and security issues of LLM systems have become the …
processing tasks. However, the safety and security issues of LLM systems have become the …
A comprehensive survey on smartnics: Architectures, development models, applications, and research directions
The end of Moore's Law and Dennard Scaling has slowed processor improvements in the
past decade. While multi-core processors have improved performance, they are limited by …
past decade. While multi-core processors have improved performance, they are limited by …
Point cloud analysis for ML-based malicious traffic detection: Reducing majorities of false positive alarms
As an emerging security paradigm, machine learning (ML) based malicious traffic detection
is an essential part of automatic defense against network attacks. Powered by dedicated …
is an essential part of automatic defense against network attacks. Powered by dedicated …
Enhancing Network Visibility and Security with Advanced Port Scanning Techniques
R Abu Bakar, B Kijsirikul - Sensors, 2023 - mdpi.com
Network security is paramount in today's digital landscape, where cyberthreats continue to
evolve and pose significant risks. We propose a DPDK-based scanner based on a study on …
evolve and pose significant risks. We propose a DPDK-based scanner based on a study on …
Synergy: A smartnic accelerated 5G dataplane and monitor for mobility prediction
S Panda, KK Ramakrishnan… - 2022 IEEE 30th …, 2022 - ieeexplore.ieee.org
The 5G user plane function (UPF) is a critical inter-connection point between the data
network and cellular network infrastructure. It governs the packet processing performance of …
network and cellular network infrastructure. It governs the packet processing performance of …
Network monitoring on multi-pipe switches
Programmable switches have been widely used to design network monitoring solutions that
operate in the fast data-plane level, eg, detecting heavy hitters, super-spreaders, computing …
operate in the fast data-plane level, eg, detecting heavy hitters, super-spreaders, computing …
SonarAuth: Using Around Device Sensing to Improve Smartwatch Behavioral Biometrics
Smartwatches are used by millions of people for applications in health, finance, and
communication. As the computational power and range of applications supported by these …
communication. As the computational power and range of applications supported by these …
Packet Processing Algorithm Identification using Program Embeddings
S VenkataKeerthy, Y Andaluri, S Dey, R Shah… - Proceedings of the 6th …, 2022 - dl.acm.org
To keep up with the network speeds, many recent works propose to offload network
functions to SmartNICs. The process involves identifying packet-processing algorithms in a …
functions to SmartNICs. The process involves identifying packet-processing algorithms in a …
Poster: A Fast Monitor for Slow Network Attacks
Recent work has demonstrated how programmable switches can effectively detect attack
traffic, such as denial-of-service attacks in the midst of high-volume network traffic. However …
traffic, such as denial-of-service attacks in the midst of high-volume network traffic. However …
[PDF][PDF] Towards Optimizing the Edge-to-Cloud Continuum Resource Allocation.
The IT community has witnessed a transition towards the cooperation of two major
paradigms, Cloud Computing and Edge Computing, paving the way to a Cloud Continuum …
paradigms, Cloud Computing and Edge Computing, paving the way to a Cloud Continuum …