Skip to content

Commit 8ec7800

Browse files
Added DAC paper
1 parent b37a87d commit 8ec7800

File tree

1 file changed

+12
-0
lines changed

1 file changed

+12
-0
lines changed

_data/publist.yml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,15 @@
1+
2+
- title: "Security Opportunities and Challenges for Disaggregated Architectures"
3+
year: 2025
4+
description: "Disaggregated computer architectures are emerging as an interesting paradigm according to which the components of a traditional monolithic server, such as CPU, memory, storage, and networking, are separated into distinct, often independently managed units that communicate over a network. Disaggregation can not only offer benefits such as greater flexibility, scalability, and resource optimization, but it can also enhance security. For example, in the context of enterprise routing, it can offer fine-grained control over the network in that allows one to deploy security policies, access control rules, and threat detection mechanisms more precisely, ensuring that only authorized traffic flows through the enterprise environment - thus enabling the zero-trust paradigm. It makes patch management easier, because its modularity allows different components to be patched independently. The same benefits translate also to cellular networks. Disaggregation is a key feature of the open radio access network (O-RAN) paradigm - whose goal is to make the radio access network intelligent, virtualized and fully interoperable. A disaggregation architecture has been proposed for post-quantum security for optical and packet transport equipment. However, disaggregation also introduces several unique security risks, such as increased attack surfaces, increased sensitive data exposure and data corruption, increased difficulty in tracing data provenance, insecure isolation among different components, insecure APIs. Also, well known security technologies, such as trusted execution environments, may have to be redesigned in the context of disaggregated architectures. In this talk, after an overview of those benefits and concerns, we focus on research approaches proposed to address some of these concerns in the context of O-RAN and in trusted execution environments."
5+
authors: "Elisa Bertino, <b>Imtiaz Karim</b>, and Ashish Kundu"
6+
link:
7+
url:
8+
display: Design Automation Conference (DAC), 2025 (invited paper).
9+
pdf:
10+
highlight: 0
11+
12+
113
- title: "Standing Firm in 5G: A Single-Round, Dropout-Resilient Secure Aggregation for Federated Learning"
214
year: 2025
315
description: "Federated learning (FL) has gained significant traction for privacy-preserving model training in next-generation networks, yet existing secure aggregation protocols often struggle with the massive connectivity and dynamic nature of 5G environments. We leverage the 5G architecture and propose simple yet efficient pre-computation techniques to design a highly efficient single-round secure aggregation protocol that meets the stringent performance requirement of mobile devices. This is achieved by leveraging the 5G architecture to employ base stations to assist the server in computing the model. Our protocol’s high resiliency is achieved through a novel adoption of key-homomorphic pseudorandom functions and t-out-of-k secret sharing mechanism. Experimental results show that our approach maintains strong security guarantees, achieves notable gains in computation and communication efficiency, and is well-suited for large-scale, on-device intelligence in 5G networks."

0 commit comments

Comments
 (0)