Publications
TAU: Trust via Asynchronous Updates for satellite network resiliency
Summary
Summary
Satellite networks are key enablers to many applications, including world-wide sensing and communications. Unlike their terrestrial counterparts, satellites are able to provide coverage in remote and hard-to-reach areas, including areas with regional conflicts. However, they are also susceptible to multiple security threats and potential failures. In addition to commonly used...
In-grown diamond color centers with narrow inhomogeneous spectral distributions
Summary
Summary
We characterize silicon vacancies in a bulk diamond sample grown at MIT Lincoln Laboratory. The measured narrow, inhomogeneous spectral distribution indicates that they will be useful for implementing scalable quantum networks.
Impact of interconnected architectures on near-term quantum algorithms
Summary
Summary
Scaling quantum computers requires interconnected processors; however, the interconnected architecture's effect on computing performance is not well quantified. We assess the impact of architectures on algorithm performance and identify performance benefits relative to interconnect-free architectures.
It is time to standardize principles and practices for software memory safety
Summary
Summary
For many decades, endemic memory-safety vulnerabilities in software trusted computing bases (TCBs) have enabled the spread of malware and devastating targeted attacks on critical infrastructure, national-security targets, companies, and individuals around the world. During the last two years, the information-technology industry has seen increasing calls for the adoption of memory-safety...
Capacity-based analysis of physical-layer and link-layer techniques for reliable communication over free-space optical fading channels
Summary
Summary
Free-space optical communication links can experience signal power fluctuations due to channel effects such as turbulence and pointing jitter. Systems can ensure reliable, error-free communication over fading channels by using physical-layer techniques (e.g., forward error correction with codeword interleaving) and link-layer techniques (e.g., erasure coding or ARQ). In this work...
High-fidelity control of a strongly coupled electro-nuclear spin-photon interface [e-print]
Summary
Summary
Long distance quantum networking requires combining efficient spin-photon interfaces with long-lived local memories. Group-IV color centers in diamond (SiV–, GeV–, and SnV–) are promising candidates for this application, containing an electronic spin-photon interface and dopant nuclear spin memory. Recent work has demonstrated state-of-the-art performance in spin-photon coupling and spin-spin entanglement...
Design and performance of a 40W uplink laser transmitter for NASA's O2O laser communications mission
Summary
Summary
NASA's Orion Artemis II Optical Communications System (O2O) will provide operational laser communications between the ground and lunar orbit for the Artemis II crewed mission. In this work we describe a 40 W ground-based laser transmitter for the O2O system. The uplink transmitter operates in the optical C-band and uses...
On-orbit pointing performance of the Modular Agile Scalable Optical Terminal (MAScOT) for the ILLUMA-T mission
Summary
Summary
The Integrated LCRD LEO User Modem and Amplifier Terminal (ILLUMA-T) payload was the first space-based user terminal to demonstrate successful two-way optical communications with a ground terminal via NASA's Laser Communications Relay Demonstration (LCRD). In order to acquire the link, the ILLUMA-T optical module open loop points a wide beacon...
Software vulnerability detection using LLM: does additional information help?
Summary
Summary
Unlike conventional machine learning (ML) or deep learning (DL) methods, Large Language Models (LLM) possess the ability to tackle complex tasks through intricate chains of reasoning, a facet often overlooked in existing work on vulnerability detection. Nevertheless, these models have demonstrated variable performance when presented with different prompts (inputs), motivating...
Exploiting temporal vulnerabilities for unauthorized access in intent-based networking
Summary
Summary
Intent-based networking (IBN) enables network administrators to express high-level goals and network policies without needing to specify low-level forwarding configurations, topologies, or protocols. Administrators can define intents that capture the overall behavior they want from the network, and an IBN controller compiles such intents into low-level configurations that get installed...