misc
This commit is contained in:
parent
621854bb39
commit
1ad8725eee
1 changed files with 2 additions and 2 deletions
|
|
@ -54,13 +54,13 @@ The low intrusiveness, independence with the host, data reliability and difficul
|
|||
However, side-channel information often comes in the form of unlabeled time series of a proxy variable of the activity.
|
||||
Enabling the definition and enforcement of high-level security policies requires extracting the state or activity of the system from the input data.
|
||||
We present in this paper a novel time series, one-shot pattern locator and classifier called Machine Activity Detector (MAD) specifically designed and evaluated for side-channel analysis.
|
||||
We evaluate MAD in two case studies on a variety of machines and datasets where it outperforms other traditional state detection solutions and present formidable performances for security rules enforcement.
|
||||
We evaluate MAD in two case studies on a variety of machines and datasets where it outperforms other traditional state detection solutions and presents formidable performances for security rules enforcement.
|
||||
Results of state detection with MAD enable the definition and verification of high-level security rules to detect various attacks without any interaction with the monitored machine.
|
||||
\end{abstract}
|
||||
%\IEEEoverridecommandlockouts
|
||||
%\vspace{1.5ex}
|
||||
\begin{keywords}
|
||||
\itshape component; formatting; style; styling; insert (key words)
|
||||
\itshape Side-Channel Analysis; Intrusion Detection.
|
||||
\end{keywords}
|
||||
% no keywords
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue