Security Emerging Technologies Assignment
- Country :
Australia
Part 1:
Report (8-10 pages)
Select a DLT-based solution (Facebooks Diem, or IBMs supply chain management, CBDC, or )
- Present the problem (why DLT is used)
- Summarize the existing DLT-based solution
- Show the pros and cons of DLT adoption in the solution
- Identify some new directions
Part 2:
- Report content: The report must (1) summarise in 5-10 lines the content of the paper; (2) discuss the strengths and weaknesses of the paper; (3) provide your own argumented assessment of the originality, practicality of the idea; (4) discuss the soundness of the approach and the extent of the evaluation.
- Output method: every learner will produce a 1-page report on his review of a selected research paper at Usenix Security 2023 or Security & Privacy 2023 conferences.
List of papers suggested - You are however free to select other papers from the identified conferences (https://www.usenix.org/conference/usenixsecurity23/fall-accepted-papers,https://www.usenix.org/conference/usenixsecurity23/summer-accepted-papers,https://sp2023.ieee-security.org/program-papers.html)
- FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Informationhttps://arxiv.org/abs/2210.10936
- Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy
- D-DAE: Defense-Penetrating Model Extraction Attacks
- Examining Zero-Shot Vulnerability Repair with Large Language Models
- A Data-free Backdoor Injection Approach in Neural Networks
- A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots
- AIRS: Explanation for Deep Reinforcement Learning based Security Applications