From 15c24f69bb841c0252a0604a2b116e8586f50d09 Mon Sep 17 00:00:00 2001 From: Arthur Grisel-Davy Date: Tue, 3 Sep 2024 13:11:23 -0400 Subject: [PATCH] update --- PhD/seminar/images/wein.svg | 103 ++++++++++++++++++++++++++++++++++++ PhD/seminar/seminar.typ | 14 +++++ 2 files changed, 117 insertions(+) create mode 100644 PhD/seminar/images/wein.svg diff --git a/PhD/seminar/images/wein.svg b/PhD/seminar/images/wein.svg new file mode 100644 index 0000000..b154ad5 --- /dev/null +++ b/PhD/seminar/images/wein.svg @@ -0,0 +1,103 @@ + + + +IndependanceRelevanceActionability diff --git a/PhD/seminar/seminar.typ b/PhD/seminar/seminar.typ index d1f3b25..cec98c7 100644 --- a/PhD/seminar/seminar.typ +++ b/PhD/seminar/seminar.typ @@ -21,13 +21,27 @@ #slide(title: "State of the IDS")[ // Most IDS rely on host-based information // Process List is a very common default info to verify +] +#slide(title:"State of the IDS")[ // Process masquerading is trivialy posible and used by many attacks (Mitre AttCK list) + +] +#slide(title:"State of the IDS")[ // Countermeasure to process masquerading +Listed by MITRE|ATT&CK: +- Monitor OS API Calls (e.g. forks) +- Monitor process creation source. +Listed by Red Canary: +- Heuristic on process properties (name, location, etc.) + +#uncover(2)[#align(center)[#text(fill:red, weight:"bold")[All Host-Based Methods!]]] ] #slide(title:"Process List Verification")[ // We can't stop using the process list, so let's try to verify it // Power as a trusted source of information +#align(center)[#image("images/wein.svg", height:100%)] +// add wein images that shows where other solutions are and show that with the right analysis tools, power side-channel is at the center. ] #slide(title:"Power Side-Channel")[