Table of contents

  • This session has been presented September 26, 2025 (11:00 - 12:00).

Description

  • Speaker

    Pierre Alain - IUT de Lannion

The rise of Intent Based Networking (IBN) has paved the way for more efficient network and security management, reduced errors, and accelerated deployment times by leveraging AI processes capable of translating natural language intents into policies or configurations. Specialized neural networks could offer a promising solution at the core of translation operations. Still, they require dedicated, large-scale corpora for training generative models, which are not currently available due to the restricted and confidential nature of the information they convey. This talk fills this gap by proposing a novel methodology for creating a corpus specifically tailored to train a Large Language Model (LLM) for this translation task. Our approach leverages advancements in Natural Language Processing (NLP) to overcome the challenges posed by the limited training data, enabling accurate interpretation and translation of high-level performance and security directives from natural language into structured, actionable formats, represented by the intermediate Network Intent LanguagE (Nile). Our experimental evaluations, grounded by human experts, indicate that our corpus generation methodology yields promising results in terms of translation accuracy, language naturalness, and reliability. To further ensure the correctness of the produced translations, our evaluation framework compares and classifies LLM outputs, assessing their semantic fidelity. This process minimizes the risk of incorrect or unsafe intent translations by filtering out translations that fail to meet stringent accuracy criteria. As a result, we have been able to generate Nile-English Aligned Translations (NEAT), a corpus which is to date two orders of magnitude larger than currently available datasets, exhibits a wide coverage of the Nile syntax, and has much lower perplexity values than other generated corpora. NEAT has been made publicly available to facilitate further research and development in adapting generative models to network management and security.

Next sessions

  • Vers l’émergence d’un droit européen pour la Blockchain : Une approche sous l’angle de la Privacy et de l’encadrement des crypto-actifs

    • December 05, 2025 (10:00 - 11:00)

    • Inria Center of the University of Rennes - Aurigny room

    Speaker : Damien Franchi - Univ Rennes, IODE

    La Blockchain, technologie derrière Bitcoin, fait l’objet d’un encadrement juridique de plusen plus important, en particulier de la part de l’Union européenne. Curieusement, le mot« Blockchain » n’apparaît pas dans les textes l’encadrant. Les expressions « technologie deregistres distribués » (Distributed ledger technology, DLT), ou, parfois, « registreélectronique » lui sont plutôt privilégiées.[…]
    • SoSysec

    • Law

  • Blockchain and digital currencies: between European regulation and technological challenges

    • December 05, 2025 (11:00 - 12:00)

    • Inria Center of the University of Rennes - Aurigny room

    Speaker : Loïc Miller - CentraleSupélec

    As the European Union develops a legal framework for crypto-assets and data protection, the technological question underlying the emergence of a genuine digital currency remains open. Blockchain today stands as an interdisciplinary field of study at the crossroads of computer science, economics, and law. This presentation will place the ongoing regulatory framework in perspective with the[…]
    • SoSysec

    • Distributed systems

  • Hardware-Software Co-Designs for Microarchitectural Security

    • December 11, 2025 (11:00 - 12:00)

    • Inria Center of the University of Rennes - Room Petri/Turing

    Speaker : Lesly-Ann Daniel - EURECOM

    Microarchitectural optimizations, such as caches and speculative out-of-order execution, are essential for achieving high performance. However, these same mechanisms also open the door to attacks that can undermine software-enforced security policies. The current gold standard for defending against such attacks is the constant-time programming discipline, which prohibits secret-dependent control[…]
    • SoSysec

    • Hardware/software co-design

    • Micro-architectural vulnerabilities

Show previous sessions