Advancements in Cybersecurity and Privacy-Preserving Technologies

The recent developments in the field of cybersecurity and privacy-preserving technologies highlight a significant shift towards enhancing the security and efficiency of cryptographic libraries, federated learning (FL) frameworks, and neural network models against sophisticated attacks. A common theme across the research is the focus on mitigating vulnerabilities to side-channel attacks (SCAs), memory-corruption attacks, and ensuring the trustworthiness and privacy of distributed machine learning processes. Innovations include the development of SCA-resistant algorithms, blockchain-empowered FL models for edge computing, and secure aggregation architectures that leverage in-network computing to reduce communication overhead. These advancements aim to provide robust solutions that not only protect against current threats but also anticipate future vulnerabilities, ensuring the integrity and confidentiality of data in increasingly distributed and interconnected systems.

Noteworthy Papers

  • Blockchain-Empowered Cyber-Secure Federated Learning for Trustworthy Edge Computing: Introduces a reputation-based trust model and blockchain technology to ensure fairness, authenticity, and trustworthiness in FL processes.
  • Make Shuffling Great Again: A Side-Channel Resistant Fisher-Yates Algorithm for Protecting Neural Networks: Proposes an SCA-secure version of the Fisher-Yates algorithm, significantly reducing vulnerabilities in neural network models.
  • FAPL-DM-BC: A Secure and Scalable FL Framework with Adaptive Privacy and Dynamic Masking, Blockchain, and XAI for the IoVs: Presents a comprehensive FL solution for the Internet of Vehicles, integrating adaptive privacy, dynamic masking, and blockchain for enhanced security and scalability.
  • NET-SA: An Efficient Secure Aggregation Architecture Based on In-Network Computing: Develops an efficient secure aggregation architecture for PPML, significantly reducing communication overhead and enhancing dropout tolerance.

Sources

Protecting Cryptographic Libraries against Side-Channel and Code-Reuse Attacks

Blockchain-Empowered Cyber-Secure Federated Learning for Trustworthy Edge Computing

Make Shuffling Great Again: A Side-Channel Resistant Fisher-Yates Algorithm for Protecting Neural Networks

FAPL-DM-BC: A Secure and Scalable FL Framework with Adaptive Privacy and Dynamic Masking, Blockchain, and XAI for the IoVs

NET-SA: An Efficient Secure Aggregation Architecture Based on In-Network Computing

Built with on top of