[HTML][HTML] Open RAN security: Challenges and opportunities

M Liyanage, A Braeken, S Shahabuddin… - Journal of Network and …, 2023 - Elsevier
Abstract Open RAN (ORAN, O-RAN) represents a novel industry-level standard for RAN
(Radio Access Network), which defines interfaces that support inter-operation between …

Hardware security for Internet of Things identity assurance

A Cirne, PR Sousa, JS Resende… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to
prioritize their security, especially in the context of identity and authentication mechanisms …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

LURK-T: Limited Use of Remote Keys with Added Trust in TLS 1.3

B Shobiri, S Pourali, D Migault… - … on Network Science …, 2024 - ieeexplore.ieee.org
In many web applications, such as Content Delivery Networks (CDNs), TLS credentials are
shared, eg, between the website's TLS origin server and the CDN's edge servers, which can …

Skynet: a Cyber-Aware Intrusion Tolerant Overseer

T Freitas, J Soares, ME Correia… - 2023 53rd Annual IEEE …, 2023 - ieeexplore.ieee.org
The increasing level of sophistication of cyber attacks which are employing cross-cutting
strategies that leverage multi-domain attack surfaces, including but not limited to, software …

Star-specific Key-homomorphic PRFs from Learning with Linear Regression

VS Sehrawat, FY Yeo, D Vassilyev - IEEE Access, 2023 - ieeexplore.ieee.org
We introduce a novel method to derandomize the learning with errors (LWE) problem by
generating deterministic yet sufficiently independent LWE instances that are constructed by …

RealSeal: Revolutionizing Media Authentication with Real-Time Realism Scoring

B Radharapu, H Krishna - … of the 26th International Conference on …, 2024 - dl.acm.org
The growing threat of deepfakes and manipulated media necessitates a radical rethinking of
media authentication. Existing methods for watermarking synthetic data fall short, as they …

Towards a Modular On-Premise Approach for Data Sharing

JS Resende, L Magalhães, A Brandão, R Martins… - Sensors, 2021 - mdpi.com
The growing demand for everyday data insights drives the pursuit of more sophisticated
infrastructures and artificial intelligence algorithms. When combined with the growing …

Open RAN and RAN‐Core Convergence

P Porambage, M Liyanage - Security and Privacy Vision in 6G …, 2023 - Wiley Online Library
In this chapter, the focus is on the security and privacy challenges and opportunities related
to the Open RAN (O‐RAN), a novel industry‐level standard for Radio Access Network. By …

Star-specific Key-homomorphic PRFs from Linear Regression and Extremal Set Theory

VS Sehrawat, FY Yeo, D Vassilyev - arXiv preprint arXiv:2205.00861, 2022 - arxiv.org
We introduce a novel method to derandomize the learning with errors (LWE) problem by
generating deterministic yet sufficiently independent LWE instances that are constructed by …