<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security | Mohammad Abdul Hadi</title>
    <link>https://Mohammad-Abdul-Hadi.github.io/tag/security/</link>
      <atom:link href="https://Mohammad-Abdul-Hadi.github.io/tag/security/index.xml" rel="self" type="application/rss+xml" />
    <description>Security</description>
    <generator>Source Themes Academic (https://sourcethemes.com/academic/)</generator><language>en-us</language><copyright>© Mohammad-Abdul-Hadi, 2026</copyright><lastBuildDate>Thu, 01 Jun 2023 00:00:00 +0000</lastBuildDate>
    <image>
      <url>https://Mohammad-Abdul-Hadi.github.io/images/icon_hu_b453e4e1cf4dca05.png</url>
      <title>Security</title>
      <link>https://Mohammad-Abdul-Hadi.github.io/tag/security/</link>
    </image>
    
    <item>
      <title>High-Throughput ACL Pattern Matching via GPU-Accelerated Convolution</title>
      <link>https://Mohammad-Abdul-Hadi.github.io/project/acl-pattern-matching/</link>
      <pubDate>Thu, 01 Jun 2023 00:00:00 +0000</pubDate>
      <guid>https://Mohammad-Abdul-Hadi.github.io/project/acl-pattern-matching/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;p&gt;A high-throughput network packet filtering engine built at Huawei R&amp;amp;D. The system treats each Access Control List (ACL) rule as a 5-dimensional filter and applies a &lt;strong&gt;convolutional linear scan&lt;/strong&gt; over millions of rules for incoming packets in parallel on Tesla V100 GPUs.&lt;/p&gt;
&lt;h2 id=&#34;key-contributions&#34;&gt;Key Contributions&lt;/h2&gt;
&lt;h3 id=&#34;gpu-accelerated-pattern-matching-engine&#34;&gt;GPU-Accelerated Pattern Matching Engine&lt;/h3&gt;
&lt;p&gt;Treats each ACL rule as a 5-d filter (source IP, destination IP, source port, destination port, protocol) and applies a convolutional linear scan over millions of rules for incoming packets in parallel, achieving massive throughput gains over traditional CPU-based approaches.&lt;/p&gt;
&lt;h3 id=&#34;structure-of-arrays-soa-rule-representation&#34;&gt;Structure-of-Arrays (SoA) Rule Representation&lt;/h3&gt;
&lt;p&gt;Proposed a novel compact representation of &lt;strong&gt;26 bytes/rule&lt;/strong&gt;, enabling coalesced memory access across threads. The system stores up to &lt;strong&gt;5M rules within 124 MB of GPU memory&lt;/strong&gt;.&lt;/p&gt;
&lt;h3 id=&#34;throughput--optimization-results&#34;&gt;Throughput &amp;amp; Optimization Results&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;100M packets/second&lt;/strong&gt; at 1K rules&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;~80K packets/second&lt;/strong&gt; sustained at 5M rules&lt;/li&gt;
&lt;li&gt;Early-termination on first full match minimizes wasted computation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;GPU Profiler&lt;/strong&gt;: Collects GPU specs on-the-fly and sweeps block/batch sizes, delivering up to &lt;strong&gt;1.5× total-time speedup&lt;/strong&gt; for the 5M-rule case by reducing kernel time ~30% via optimal batch partitioning.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt; C, C++, PyTorch, Linux Kernel, CPU/GPU Profiling&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Malware Filter Framework (MFF) — CNN Optimization</title>
      <link>https://Mohammad-Abdul-Hadi.github.io/project/malware-filter-framework/</link>
      <pubDate>Thu, 01 Sep 2022 00:00:00 +0000</pubDate>
      <guid>https://Mohammad-Abdul-Hadi.github.io/project/malware-filter-framework/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;p&gt;Optimization and engineering overhaul of Huawei&amp;rsquo;s production Malware Filter Framework (MFF) at Anshi Lab. The work combined architectural improvements to the deep learning model with low-level systems engineering to achieve a dramatic performance improvement in a production security pipeline.&lt;/p&gt;
&lt;h2 id=&#34;cnn-optimization-via-atrous-spatial-pyramid-pooling&#34;&gt;CNN Optimization via Atrous Spatial Pyramid Pooling&lt;/h2&gt;
&lt;p&gt;Replaced standard convolutions in MFF with &lt;strong&gt;dilated (atrous) convolutions&lt;/strong&gt; using Spatial Pyramid Pooling, enabling the model to capture multi-scale features without increasing the number of parameters. Combined with feature-profiling and memory caching, this achieved a &lt;strong&gt;315% performance boost&lt;/strong&gt; over the baseline.&lt;/p&gt;
&lt;h2 id=&#34;model-lifecycle--engineering-excellence&#34;&gt;Model Lifecycle &amp;amp; Engineering Excellence&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;LLMOps Pipelines Management&lt;/strong&gt;: Directed multiple lifecycle components including Model Versioners, Validators, Regression Testing, Runtimes, Schedulers, Domain/Data-Drift Detectors, and Retrainers.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Module Refactoring&lt;/strong&gt;: Drove codebase restructuring and introduced industry-leading testing and software build practices to improve engineering efficiency.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Technology Map&lt;/strong&gt;: Linux C, user-space process development, kernel module development, memory allocation optimization, and low-level performance instrumentation.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt; C, TensorFlow, Linux Kernel, CI/CD, MLflow, Weights &amp;amp; Biases, Docker, Kubernetes&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Semantic LLM — Comprehensive Binary Analysis for Malware Detection</title>
      <link>https://Mohammad-Abdul-Hadi.github.io/project/semantic-llm/</link>
      <pubDate>Thu, 01 Sep 2022 00:00:00 +0000</pubDate>
      <guid>https://Mohammad-Abdul-Hadi.github.io/project/semantic-llm/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;p&gt;A full-stack agentic AI system for zero-day binary malware analysis, built at Huawei R&amp;amp;D&amp;rsquo;s Anshi Lab. The system operates at the intersection of &lt;strong&gt;LLM for Security&lt;/strong&gt; (binary analysis) and &lt;strong&gt;Security for LLM&lt;/strong&gt; (adversarial robustness), and is deployed across heterogeneous hardware including Huawei NPU, GPU clusters, and IoT edge devices.&lt;/p&gt;
&lt;h2 id=&#34;semantic-function-model-sfm&#34;&gt;Semantic Function Model (SFM)&lt;/h2&gt;
&lt;p&gt;Developed two architecture variants for function-level binary analysis:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Tokenless Instruction Set Transformer&lt;/strong&gt; — takes 32-dimensional architecture-specific instruction sets as input, eliminating the need for a separate tokenizer.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Intermediate Representation Tokenizer&lt;/strong&gt; — lifts binaries to LLVM IR with a POV Normalization Engine for architecture-agnostic analysis.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;semantic-program-model-spm&#34;&gt;Semantic Program Model (SPM)&lt;/h2&gt;
&lt;p&gt;Replaced Self-Attention with &lt;strong&gt;Holographic Reduced Representations (HRR)&lt;/strong&gt; in a transformer. This maps XOR-logic to the Query-Key interaction with O(T log T) complexity, enabling analysis of malicious binaries with 100,000+ functions. The symbolic binding operations act as a natural adversarial noise filter, making the model inherently resistant to adversarial attacks.&lt;/p&gt;
&lt;h2 id=&#34;malware-analyst-llm&#34;&gt;Malware Analyst LLM&lt;/h2&gt;
&lt;p&gt;Utilized &lt;strong&gt;Mixture-of-Experts (MoE)&lt;/strong&gt; routing across SFM and SPM pathways. Elevated the container framework with &lt;strong&gt;Agent Client Protocol (ACP)&lt;/strong&gt; and &lt;strong&gt;Model Context Protocol (MCP)&lt;/strong&gt; infrastructure that dynamically coordinates:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;6 multi-turn Online Agents&lt;/strong&gt; including: Program Encoder Signature Generator, KNN Search, CFG Segment Classifier (GAT), LLM4Decompile Code Generation, and Pangu-R1 reasoning for explainability.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;10+ Autonomous Tools&lt;/strong&gt; including: Ghidra Pro Disassembler, LLVM IR Lifter, Static and Dynamic Behavior Logger (Emulator), and Chroma RAG-DB.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;downstream-capabilities&#34;&gt;Downstream Capabilities&lt;/h2&gt;
&lt;p&gt;Scaled capabilities include &lt;strong&gt;Function DNA Matching&lt;/strong&gt;, vulnerability auditing, and cross-architecture code similarity search using high-dimensional function/program embeddings from SFM and SPM.&lt;/p&gt;
&lt;h2 id=&#34;heterogeneous-hardware-deployment&#34;&gt;Heterogeneous Hardware Deployment&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Huawei NPU&lt;/strong&gt;: W8A8 dynamic quantization via HiFloat (HF8) using CANN &amp;amp; ModelSlim.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IoT/Edge&lt;/strong&gt;: Progressive Teacher–Student Distillation.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;GPU Clusters&lt;/strong&gt;: Mixed-precision training against open-source and in-house malware repositories.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt; Python, C++, Assembly, PyTorch, Hugging Face (Transformers, PEFT), LoRA/QLoRA, CANN, vLLM, NVIDIA TensorRT-LLM, DSPy, PydanticAI, CrewAI, MCP, Pinecone, CPU/GPU/NPU Profiling&lt;/p&gt;
</description>
    </item>
    
  </channel>
</rss>
