Security layers and related services within the Horizon Europe NEUROPULS project
- URL: http://arxiv.org/abs/2312.09383v1
- Date: Thu, 14 Dec 2023 22:42:52 GMT
- Title: Security layers and related services within the Horizon Europe NEUROPULS project
- Authors: Fabio Pavanello, Cedric Marchand, Paul Jimenez, Xavier Letartre, Ricardo Chaves, Niccolò Marastoni, Alberto Lovato, Mariano Ceccato, George Papadimitriou, Vasileios Karakostas, Dimitris Gizopoulos, Roberta Bardini, Tzamn Melendez Carmona, Stefano Di Carlo, Alessandro Savino, Laurence Lerch, Ulrich Ruhrmair, Sergio Vinagrero Gutierrez, Giorgio Di Natale, Elena Ioana Vatajelu,
- Abstract summary: This paper discusses the security layers and related services that will be developed within the Horizon Europe NEUROPULS project.
Their objective is to provide a series of services to support the secure operation of a neuromorphic photonic accelerator for edge computing applications.
- Score: 30.539724387243396
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In the contemporary security landscape, the incorporation of photonics has emerged as a transformative force, unlocking a spectrum of possibilities to enhance the resilience and effectiveness of security primitives. This integration represents more than a mere technological augmentation; it signifies a paradigm shift towards innovative approaches capable of delivering security primitives with key properties for low-power systems. This not only augments the robustness of security frameworks, but also paves the way for novel strategies that adapt to the evolving challenges of the digital age. This paper discusses the security layers and related services that will be developed, modeled, and evaluated within the Horizon Europe NEUROPULS project. These layers will exploit novel implementations for security primitives based on physical unclonable functions (PUFs) using integrated photonics technology. Their objective is to provide a series of services to support the secure operation of a neuromorphic photonic accelerator for edge computing applications.
Related papers
- Adaptive Lightweight Security for Performance Efficiency in Critical Healthcare Monitoring [1.1874952582465603]
The Internet of Things (IoT) with its diverse technologies has become an integral component of future healthcare systems.
The evolving healthcare paradigm requires adaptive security procedures and technologies that can adapt to the varying resource constraints of IoT devices.
This article brings forth the unique healthcare monitoring requirements and studies the existing encryption-based security approaches to provide the necessary security.
arXiv Detail & Related papers (2024-06-06T06:55:16Z) - Enhancing Physical Layer Communication Security through Generative AI with Mixture of Experts [80.0638227807621]
generative artificial intelligence (GAI) models have demonstrated superiority over conventional AI methods.
MoE, which uses multiple expert models for prediction through a gate mechanism, proposes possible solutions.
arXiv Detail & Related papers (2024-05-07T11:13:17Z) - Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure [0.04096453902709291]
This analysis explores the impact of quantum computing on critical infrastructure and cloud services.
We advocate for proactive security strategies and collaboration between sectors to develop and implement quantum-resistant cryptography.
This blueprint strengthens each area's defenses against potential quantum-induced cyber threats.
arXiv Detail & Related papers (2024-04-16T15:36:23Z) - ISSF: The Intelligent Security Service Framework for Cloud-Native Operation [0.2867517731896504]
This research develops an agent-based intelligent security service framework (ISSF) for cloud-native operation.
It includes a dynamic access graph model to represent the cloud-native environment and an action model to represent offense and defense actions.
Experiments demonstrate that our framework can sufficiently model the security posture of a cloud-native system for defenders.
arXiv Detail & Related papers (2024-03-03T13:13:06Z) - Generative AI for Secure Physical Layer Communications: A Survey [80.0638227807621]
Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating rapid advancement and unparalleled proficiency in generating diverse content.
In this paper, we offer an extensive survey on the various applications of GAI in enhancing security within the physical layer of communication networks.
We delve into the roles of GAI in addressing challenges of physical layer security, focusing on communication confidentiality, authentication, availability, resilience, and integrity.
arXiv Detail & Related papers (2024-02-21T06:22:41Z) - IoT in the Cloud: Exploring Security Challenges and Mitigations for a Connected World [18.36339203254509]
The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a paradigm shift in the digital landscape.
IoT devices, inherently connected to the internet, are susceptible to various forms of attacks.
IoT services often handle sensitive user data, which could be exploited by malicious actors or unauthorized service providers.
arXiv Detail & Related papers (2024-02-01T05:55:43Z) - An Introduction to Adaptive Software Security [0.0]
This paper presents an innovative approach integrating the MAPE-K loop and the Software Development Life Cycle (SDLC)
It proactively embeds security policies throughout development, reducing vulnerabilities from different levels of software engineering.
arXiv Detail & Related papers (2023-12-28T20:53:11Z) - Scaling #DNN-Verification Tools with Efficient Bound Propagation and
Parallel Computing [57.49021927832259]
Deep Neural Networks (DNNs) are powerful tools that have shown extraordinary results in many scenarios.
However, their intricate designs and lack of transparency raise safety concerns when applied in real-world applications.
Formal Verification (FV) of DNNs has emerged as a valuable solution to provide provable guarantees on the safety aspect.
arXiv Detail & Related papers (2023-12-10T13:51:25Z) - Approximate Shielding of Atari Agents for Safe Exploration [83.55437924143615]
We propose a principled algorithm for safe exploration based on the concept of shielding.
We present preliminary results that show our approximate shielding algorithm effectively reduces the rate of safety violations.
arXiv Detail & Related papers (2023-04-21T16:19:54Z) - Neural Certificates for Safe Control Policies [108.4560749465701]
This paper develops an approach to learn a policy of a dynamical system that is guaranteed to be both provably safe and goal-reaching.
We show the effectiveness of the method to learn both safe and goal-reaching policies on various systems, including pendulums, cart-poles, and UAVs.
arXiv Detail & Related papers (2020-06-15T15:14:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.