diff --git a/PhD/research_proposal/conclusion.tex b/PhD/research_proposal/conclusion.tex index ed12603..3eb998d 100644 --- a/PhD/research_proposal/conclusion.tex +++ b/PhD/research_proposal/conclusion.tex @@ -1,18 +1,18 @@ \chapter{Conclusion} -The problem of leveraging power side-channel analysis to defend embedded system present unique capabilities. -In opposition with current common \gls{ids} techniques, physics-based security is not built on purpose-made actionable data. -The very nature of the input information sets this techniques aside. -Power consumption is closely related to instruction execution, and makes it a good proxy variable for machine activity. -Moreover, power is easy and cheap to measures reliably at a high sampling rate, enabling analysis of any machine consuming electricity. +The problem of leveraging power side-channel analysis to defend embedded systems presents unique capabilities. +Contrary to current common \gls{ids} techniques, physics-based security is not built on purpose-made actionable data. +The very nature of the input information sets this technique aside. +Power consumption is closely related to instruction execution and makes it a good proxy variable for machine activity. +Moreover, power is easy and cheap to measure reliably at a high sampling rate, enabling analysis of any machine consuming electricity. Finally, a sequence of instructions is generally related to a unique power consumption pattern. -This \textit{one-to-one} relationship, allows to consider the power consumption as a signature for a software of machine activity. -However, power consumtion is not an actionable information. -From the raw time series format, little can be extracted about the machine activity or integrity. -To enable further analysis, a set of algorithm is required for both runtime online analysis as well as offline monitoring of specific activity. -The full range of capabilities is still unknown. -Successfull runtime monitoring enables the detection of activity policy violation, anomalous activity detection, machine failure detection or distributed attacks. -On the other hand, pre-OS monitoring enable the detection of boot process violation at a level where common \gls{ids} are not enabled yet. -These are just some of the possible applciation of this technology, with many more to be discovered. +This \textit{one-to-one} relationship allows us to consider the power consumption as a signature for software of machine activity. +However, power consumption is not an actionable information. +Little can be extracted from the raw time series format about the machine's activity or integrity. +To enable further analysis, a set of algorithms is required for both runtime online analysis and offline monitoring of specific activity. +The full range of capabilities remains to be discovered. +Successful runtime monitoring enables the detection of activity policy violations, anomalous activity detection, machine failure detection or distributed attacks. +On the other hand, pre-OS monitoring enables the detection of boot process violation at a level where common \gls{ids} are not enabled yet. +These are just some of the possible applications of this technology, with many more to be discovered. + +This proposal presents some problems to study that enable the development of physics-based security. -With this proposal, I present some problems to study that enables some of the applications of physics-based security. -I hereby ask to continue researching these problems with the view to complete my PhD thesis.