gramarly conclusion

This commit is contained in:
Arthur Grisel-Davy 2023-10-02 10:02:34 -04:00
parent 0beeb7eef8
commit 3bdc87913c

View file

@ -1,18 +1,18 @@
\chapter{Conclusion}
The problem of leveraging power side-channel analysis to defend embedded system present unique capabilities.
In opposition with current common \gls{ids} techniques, physics-based security is not built on purpose-made actionable data.
The very nature of the input information sets this techniques aside.
Power consumption is closely related to instruction execution, and makes it a good proxy variable for machine activity.
Moreover, power is easy and cheap to measures reliably at a high sampling rate, enabling analysis of any machine consuming electricity.
The problem of leveraging power side-channel analysis to defend embedded systems presents unique capabilities.
Contrary to current common \gls{ids} techniques, physics-based security is not built on purpose-made actionable data.
The very nature of the input information sets this technique aside.
Power consumption is closely related to instruction execution and makes it a good proxy variable for machine activity.
Moreover, power is easy and cheap to measure reliably at a high sampling rate, enabling analysis of any machine consuming electricity.
Finally, a sequence of instructions is generally related to a unique power consumption pattern.
This \textit{one-to-one} relationship, allows to consider the power consumption as a signature for a software of machine activity.
However, power consumtion is not an actionable information.
From the raw time series format, little can be extracted about the machine activity or integrity.
To enable further analysis, a set of algorithm is required for both runtime online analysis as well as offline monitoring of specific activity.
The full range of capabilities is still unknown.
Successfull runtime monitoring enables the detection of activity policy violation, anomalous activity detection, machine failure detection or distributed attacks.
On the other hand, pre-OS monitoring enable the detection of boot process violation at a level where common \gls{ids} are not enabled yet.
These are just some of the possible applciation of this technology, with many more to be discovered.
This \textit{one-to-one} relationship allows us to consider the power consumption as a signature for software of machine activity.
However, power consumption is not an actionable information.
Little can be extracted from the raw time series format about the machine's activity or integrity.
To enable further analysis, a set of algorithms is required for both runtime online analysis and offline monitoring of specific activity.
The full range of capabilities remains to be discovered.
Successful runtime monitoring enables the detection of activity policy violations, anomalous activity detection, machine failure detection or distributed attacks.
On the other hand, pre-OS monitoring enables the detection of boot process violation at a level where common \gls{ids} are not enabled yet.
These are just some of the possible applications of this technology, with many more to be discovered.
This proposal presents some problems to study that enable the development of physics-based security.
With this proposal, I present some problems to study that enables some of the applications of physics-based security.
I hereby ask to continue researching these problems with the view to complete my PhD thesis.