{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:21:49Z","timestamp":1775067709667,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T00:00:00Z","timestamp":1731888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["ITE-2226443, ITE-2326882, CNS-2112471"],"award-info":[{"award-number":["ITE-2226443, ITE-2326882, CNS-2112471"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,18]]},"DOI":"10.1145\/3696348.3696881","type":"proceedings-article","created":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:20:52Z","timestamp":1731284452000},"page":"77-85","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["6G-XSec: Explainable Edge Security for Emerging OpenRAN Architectures"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2753-0250","authenticated-orcid":false,"given":"Haohuang","family":"Wen","sequence":"first","affiliation":[{"name":"The Ohio State University"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6681-4310","authenticated-orcid":false,"given":"Prakhar","family":"Sharma","sequence":"additional","affiliation":[{"name":"SRI"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0718-6605","authenticated-orcid":false,"given":"Vinod","family":"Yegneswaran","sequence":"additional","affiliation":[{"name":"SRI"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4661-2443","authenticated-orcid":false,"given":"Phillip","family":"Porras","sequence":"additional","affiliation":[{"name":"SRI"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3940-2467","authenticated-orcid":false,"given":"Ashish","family":"Gehani","sequence":"additional","affiliation":[{"name":"SRI"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6527-5994","authenticated-orcid":false,"given":"Zhiqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"The Ohio State University"}]}],"member":"320","published-online":{"date-parts":[[2024,11,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. O-RAN.WG3.E2SM-R003-v04.00: O-RAN E2 Service Model (E2SM) KPM."},{"key":"e_1_3_2_1_2_1","unstructured":"2024. 6G standardization - an overview of timeline and high-level technology principles. https:\/\/www.ericsson.com\/en\/blog\/2024\/3\/6g-standardization-timeline-and-technology-principles."},{"key":"e_1_3_2_1_3_1","unstructured":"2024. O-RAN Software Community. https:\/\/wiki.o-ran-sc.org\/display\/ORAN."},{"key":"e_1_3_2_1_4_1","unstructured":"2024. O-RAN.WG1.OAD-R003-v11.00: O-RAN Architecture Description."},{"key":"e_1_3_2_1_5_1","unstructured":"2024. O-RAN.WG3.E2AP-R003-v05.00: O-RAN E2 Application Protocol (E2AP)."},{"key":"e_1_3_2_1_6_1","unstructured":"2024. O-RAN.WG3.E2SM-CCC-R003-v03.00: O-RAN E2 Service Model (E2SM) Cell Configuration and Control."},{"key":"e_1_3_2_1_7_1","unstructured":"2024. O-RAN.WG3.E2SM-R003-v05.00: O-RAN E2 Service Model (E2SM)."},{"key":"e_1_3_2_1_8_1","unstructured":"2024. O-RAN.WG3.E2SM-RC-R003-v05.00: O-RAN E2 Service Model (E2SM) RAN Control."},{"key":"e_1_3_2_1_9_1","unstructured":"2024. oai \/ openairinterface5G. https:\/\/gitlab.eurecom.fr\/oai\/openairinterface5g."},{"key":"e_1_3_2_1_10_1","unstructured":"2024. USRP Software Defined Radio (SDR). https:\/\/www.ettus.com\/products\/."},{"key":"e_1_3_2_1_11_1","unstructured":"3GPP. 2024. NG-RAN Architecture description. http:\/\/www.3gpp.org\/DynaReport\/38401.htm."},{"key":"e_1_3_2_1_12_1","unstructured":"3GPP. 2024. NG-RAN F1 Application Protocol (F1AP). http:\/\/www.3gpp.org\/DynaReport\/38473.htm."},{"key":"e_1_3_2_1_13_1","unstructured":"3GPP. 2024. Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS). http:\/\/www.3gpp.org\/DynaReport\/24301.htm."},{"key":"e_1_3_2_1_14_1","unstructured":"3GPP. 2024. Radio Resource Control (RRC). http:\/\/www.3gpp.org\/DynaReport\/38331.htm."},{"key":"e_1_3_2_1_15_1","unstructured":"3GPP. 2024. Security architecture and procedures for 5G System. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3169."},{"key":"e_1_3_2_1_16_1","volume-title":"Diogo Almeida, Janko Altenschmidt, Sam Altman, Shyamal Anadkat, et al.","author":"Achiam Josh","year":"2023","unstructured":"Josh Achiam, Steven Adler, Sandhini Agarwal, Lama Ahmad, Ilge Akkaya, Florencia Leoni Aleman, Diogo Almeida, Janko Altenschmidt, Sam Altman, Shyamal Anadkat, et al. 2023. Gpt-4 technical report. arXiv preprint arXiv:2303.08774 (2023)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403392"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485914"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3568000"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.101.2001120"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN53946.2021.9677430"},{"key":"e_1_3_2_1_22_1","unstructured":"Tom Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared D Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell et al. 2020. Language models are few-shot learners. Advances in neural information processing systems 33 (2020) 1877--1901."},{"key":"e_1_3_2_1_23_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Chen Yi","year":"2022","unstructured":"Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, and Dongfang Zhao. 2022. Seeing the Forest for the Trees: Understanding Security Hazards in the {3GPP} Ecosystem through Intelligent Analysis on Change Requests. In 31st USENIX Security Symposium (USENIX Security 22). 17--34."},{"key":"e_1_3_2_1_24_1","volume-title":"Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1197--1214","author":"Chen Yi","year":"2021","unstructured":"Yi Chen, Yepeng Yao, XiaoFeng Wang, Dandan Xu, Chang Yue, Xiaozhong Liu, Kai Chen, Haixu Tang, and Baoxu Liu. 2021. Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1197--1214."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467826"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps56602.2022.10008647"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664272"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.002.2200079"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796744"},{"key":"e_1_3_2_1_31_1","volume-title":"Syed Rafiul Hussain, and Omar Chowdhury","author":"Echeverria Mitziu","year":"2021","unstructured":"Mitziu Echeverria, Zeeshan Ahmed, Bincheng Wang, M Fareed Arif, Syed Rafiul Hussain, and Omar Chowdhury. 2021. PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification. arXiv e-prints (2021), arXiv-2101."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560525"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980159.2980163"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628176"},{"key":"e_1_3_2_1_35_1","volume-title":"Long short-term memory. Neural computation 9, 8","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354263"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00038"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628191"},{"key":"e_1_3_2_1_40_1","volume-title":"LTrack: Stealthy Tracking of Mobile Phones in LTE. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Kotuliak Martin","year":"2022","unstructured":"Martin Kotuliak, Simon Erni, Patrick Leu, Marc Roeschlin, and Srdjan \u010capkun. 2022. LTrack: Stealthy Tracking of Mobile Phones in LTE. In 31st USENIX Security Symposium (USENIX Security 22). 1291---1306."},{"key":"e_1_3_2_1_41_1","volume-title":"Bhawani Shanker Bhati","author":"Lacava Andrea","year":"2023","unstructured":"Andrea Lacava, Michele Polese, Rajarajan Sivaraj, Rahul Soundrarajan, Bhawani Shanker Bhati, Tarunjeet Singh, Tommaso Zugno, Francesca Cuomo, and Tommaso Melodia. 2023. Programmable and customized intelligence for traffic steering in 5g networks using open ran architectures. IEEE Transactions on Mobile Computing (2023)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326082"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps52748.2021.9681936"},{"key":"e_1_3_2_1_44_1","volume-title":"The roadmap to 6G: AI empowered wireless networks","author":"Letaief Khaled B","year":"2019","unstructured":"Khaled B Letaief, Wei Chen, Yuanming Shi, Jun Zhang, and Ying-Jun Angela Zhang. 2019. The roadmap to 6G: AI empowered wireless networks. IEEE communications magazine 57, 8 (2019), 84---90."},{"key":"e_1_3_2_1_45_1","first-page":"9459","article-title":"Retrieval-augmented generation for knowledge-intensive nlp tasks","volume":"33","author":"Lewis Patrick","year":"2020","unstructured":"Patrick Lewis, Ethan Perez, Aleksandra Piktus, Fabio Petroni, Vladimir Karpukhin, Naman Goyal, Heinrich K\u00fcttler, Mike Lewis, Wen-tau Yih, Tim Rockt\u00e4schel, et al. 2020. Retrieval-augmented generation for knowledge-intensive nlp tasks. Advances in Neural Information Processing Systems 33 (2020), 9459---9474.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973751"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467817"},{"key":"e_1_3_2_1_49_1","volume-title":"Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. In Network and Distributed Systems Security (NDSS) Symposium.","author":"Mirsky Yisroel","year":"2018","unstructured":"Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai. 2018. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. In Network and Distributed Systems Security (NDSS) Symposium."},{"key":"e_1_3_2_1_50_1","volume-title":"Deep learning for anomaly detection: A review. ACM computing surveys (CSUR) 54, 2","author":"Pang Guansong","year":"2021","unstructured":"Guansong Pang, Chunhua Shen, Longbing Cao, and Anton Van Den Hengel. 2021. Deep learning for anomaly detection: A review. ACM computing surveys (CSUR) 54, 2 (2021), 1---38."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3188013"},{"key":"e_1_3_2_1_52_1","volume-title":"Understanding O-RAN: Architecture, interfaces, algorithms, security, and research challenges. arXiv preprint arXiv:2202.01032","author":"Polese Michele","year":"2022","unstructured":"Michele Polese, Leonardo Bonati, Salvatore D'Oro, Stefano Basagni, and Tommaso Melodia. 2022. Understanding O-RAN: Architecture, interfaces, algorithms, security, and research challenges. arXiv preprint arXiv:2202.01032 (2022)."},{"key":"e_1_3_2_1_53_1","first-page":"599","article-title":"Learning Internal Representations by Error Propagation, Parallel Distributed Processing, Explorations in the Microstructure of Cognition, ed. DE Rumelhart and J. McClelland. Vol. 1. 1986","volume":"71","author":"Rumelhart David E","year":"1986","unstructured":"David E Rumelhart, Geoffrey E Hinton, and Ronald J Williams. 1986. Learning Internal Representations by Error Propagation, Parallel Distributed Processing, Explorations in the Microstructure of Cognition, ed. DE Rumelhart and J. McClelland. Vol. 1. 1986. Biometrika 71 (1986), 599---607.","journal-title":"Biometrika"},{"key":"e_1_3_2_1_54_1","volume-title":"5g-nidd: A comprehensive network intrusion detection dataset generated over 5g wireless network. arXiv preprint arXiv:2212.01298","author":"Samarakoon Sehan","year":"2022","unstructured":"Sehan Samarakoon, Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Sang-Yoon Chang, Jinoh Kim, Jonghyun Kim, and Mika Ylianttila. 2022. 5g-nidd: A comprehensive network intrusion detection dataset generated over 5g wireless network. arXiv preprint arXiv:2212.01298 (2022)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621223"},{"key":"e_1_3_2_1_56_1","volume-title":"20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Tan Zhaowei","year":"2023","unstructured":"Zhaowei Tan, Jinghao Zhao, Boyan Ding, and Songwu Lu. 2023. Cell-DAM: User-Space, Rootless Detection and Mitigation for 5G Data Plane. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). 1601---1619."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.14778\/3514061.3514067"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00045"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24527"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3565474.3569070"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24432"},{"key":"e_1_3_2_1_62_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Yang Hojoon","year":"2019","unstructured":"Hojoon Yang, Sangwook Bae, Mincheol Son, Hongil Kim, Song Min Kim, and Yongdae Kim. 2019. Hiding in Plain Signal: Physical Signal Overshadowing Attack on {LTE}. In 28th USENIX Security Symposium (USENIX Security 19). 55---72."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011409"},{"key":"e_1_3_2_1_64_1","unstructured":"Yue Zhang Yafu Li Leyang Cui Deng Cai Lemao Liu Tingchen Fu Xinting Huang Enbo Zhao Yu Zhang Yulong Chen et al. 2023. Siren's song in the AI ocean: a survey on hallucination in large language models. arXiv preprint arXiv:2309.01219 (2023)."}],"event":{"name":"HotNets '24: The 23rd ACM Workshop on Hot Topics in Networks","location":"Irvine CA USA","acronym":"HotNets '24","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 23rd ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696348.3696881","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696348.3696881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:10:14Z","timestamp":1755879014000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696348.3696881"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,18]]},"references-count":64,"alternative-id":["10.1145\/3696348.3696881","10.1145\/3696348"],"URL":"https:\/\/doi.org\/10.1145\/3696348.3696881","relation":{},"subject":[],"published":{"date-parts":[[2024,11,18]]},"assertion":[{"value":"2024-11-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}