This commit is contained in:
Arthur Grisel-Davy 2023-07-29 22:20:06 -04:00
parent 621854bb39
commit 1ad8725eee

View file

@ -54,13 +54,13 @@ The low intrusiveness, independence with the host, data reliability and difficul
However, side-channel information often comes in the form of unlabeled time series of a proxy variable of the activity.
Enabling the definition and enforcement of high-level security policies requires extracting the state or activity of the system from the input data.
We present in this paper a novel time series, one-shot pattern locator and classifier called Machine Activity Detector (MAD) specifically designed and evaluated for side-channel analysis.
We evaluate MAD in two case studies on a variety of machines and datasets where it outperforms other traditional state detection solutions and present formidable performances for security rules enforcement.
We evaluate MAD in two case studies on a variety of machines and datasets where it outperforms other traditional state detection solutions and presents formidable performances for security rules enforcement.
Results of state detection with MAD enable the definition and verification of high-level security rules to detect various attacks without any interaction with the monitored machine.
\end{abstract}
%\IEEEoverridecommandlockouts
%\vspace{1.5ex}
\begin{keywords}
\itshape component; formatting; style; styling; insert (key words)
\itshape Side-Channel Analysis; Intrusion Detection.
\end{keywords}
% no keywords