camera ready DSD qrs
This commit is contained in:
parent
f4eec6ea31
commit
40c54e53a7
3 changed files with 19 additions and 13 deletions
3
.gitignore
vendored
3
.gitignore
vendored
|
|
@ -30,3 +30,6 @@
|
||||||
|
|
||||||
# markdown files
|
# markdown files
|
||||||
*.md
|
*.md
|
||||||
|
|
||||||
|
# archives
|
||||||
|
*.zip
|
||||||
|
|
|
||||||
|
|
@ -103,8 +103,11 @@ series = {MobiSys '17}
|
||||||
title = {Reference hidden for peer-review},
|
title = {Reference hidden for peer-review},
|
||||||
}
|
}
|
||||||
|
|
||||||
@misc{hidden-articlemlcs,
|
@misc{articlemlcs,
|
||||||
title = {Reference hidden for peer-review},
|
title = {Side-channel Based Runtime Intrusion Detection for Network Equipment},
|
||||||
|
author = {Arthur Grisel-Davy, Goksen U. Guler, Julian Dickert, Philippe Vibien, Waleed Khan, Jack Morgan, Carlos Moreno, and Sebastian Fischmeister},
|
||||||
|
year = {2023},
|
||||||
|
Journal = {Machine Learning for Cyber Security. ML4CS 2023}
|
||||||
}
|
}
|
||||||
|
|
||||||
@inbook{278e1df91d22494f9be2adfca2559f92,
|
@inbook{278e1df91d22494f9be2adfca2559f92,
|
||||||
|
|
|
||||||
|
|
@ -32,16 +32,16 @@
|
||||||
\begin{document}
|
\begin{document}
|
||||||
\input{acronyms}
|
\input{acronyms}
|
||||||
\title{\textbf{\Large MAD: One-Shot Machine Activity Detector for Physics-Based Cyber Security\\}}
|
\title{\textbf{\Large MAD: One-Shot Machine Activity Detector for Physics-Based Cyber Security\\}}
|
||||||
%\author{
|
|
||||||
% Arthur Grisel-Davy$^{1,*}$, Sebastian Fischmeister$^{1}$\\
|
|
||||||
% \normalsize $^{1}$University of Waterloo, Ontario, Canada\\
|
|
||||||
% \normalsize agriseld@uwaterloo.ca, sfishme@uwaterloo.ca\\
|
|
||||||
% \normalsize *corresponding author
|
|
||||||
%}
|
|
||||||
\author{
|
\author{
|
||||||
\vspace{\baselineskip}
|
Arthur Grisel-Davy$^{1,*}$, Sebastian Fischmeister$^{1}$\\
|
||||||
\vspace{1.1\baselineskip}
|
\normalsize $^{1}$University of Waterloo, Ontario, Canada\\
|
||||||
|
\normalsize agriseld@uwaterloo.ca, sfishme@uwaterloo.ca\\
|
||||||
|
\normalsize *Corresponding author
|
||||||
}
|
}
|
||||||
|
%\author{
|
||||||
|
% \vspace{\baselineskip}
|
||||||
|
% \vspace{1.1\baselineskip}
|
||||||
|
%}
|
||||||
%+++++++++++++++++++++++++++++++++++++++++++
|
%+++++++++++++++++++++++++++++++++++++++++++
|
||||||
|
|
||||||
% use only for invited papers
|
% use only for invited papers
|
||||||
|
|
@ -127,7 +127,7 @@ In experiments, \gls{mad} outperforms other approaches in accuracy and the reduc
|
||||||
|
|
||||||
We will present the current related work on physics-based security and time series pattern detection in Section~\ref{sec:related}.
|
We will present the current related work on physics-based security and time series pattern detection in Section~\ref{sec:related}.
|
||||||
Then we will introduce the formal and practical definitions of the solution in Section~\ref{sec:statement} and~\ref{sec:solution}.
|
Then we will introduce the formal and practical definitions of the solution in Section~\ref{sec:statement} and~\ref{sec:solution}.
|
||||||
The two case studies presented in section~\ref{sec:cs1} and~\ref{sec:cs2} illustrate the performances of the solution in various situations.
|
The two case studies presented in Section~\ref{sec:cs1} and~\ref{sec:cs2} illustrate the performances of the solution in various situations.
|
||||||
Finally, we will discuss some important aspects of the proposed solution in Section~\ref{sec:discussion}.
|
Finally, we will discuss some important aspects of the proposed solution in Section~\ref{sec:discussion}.
|
||||||
|
|
||||||
\section{Related Work}\label{sec:related}
|
\section{Related Work}\label{sec:related}
|
||||||
|
|
@ -141,7 +141,7 @@ Acoustic emissions \cite{belikovetsky2018digital}, heat pattern signature \cite{
|
||||||
Side-channel information collection generally results in time series objects to analyze.
|
Side-channel information collection generally results in time series objects to analyze.
|
||||||
|
|
||||||
There exists a variety of methods for analyzing time series.
|
There exists a variety of methods for analyzing time series.
|
||||||
For signature-based solutions, a specific extract of the data is compared to known-good references to assess the integrity of the host \cite{9934955, hidden-articlemlcs}.
|
For signature-based solutions, a specific extract of the data is compared to known-good references to assess the integrity of the host \cite{9934955, articlemlcs}.
|
||||||
This signature comparison enables the verification of expected and specific sections and requires that the sections of interest can be extracted and synchronized.
|
This signature comparison enables the verification of expected and specific sections and requires that the sections of interest can be extracted and synchronized.
|
||||||
Another solution for detecting intrusions is the definition of security policies.
|
Another solution for detecting intrusions is the definition of security policies.
|
||||||
Security policies are sets of rules that describe wanted or unwanted behavior.
|
Security policies are sets of rules that describe wanted or unwanted behavior.
|
||||||
|
|
@ -514,7 +514,7 @@ The dataset is publicly available \cite{zenodo}.
|
||||||
|
|
||||||
\textbf{Lab Captures:}
|
\textbf{Lab Captures:}
|
||||||
NUCPC-0, NUCPC-1, WAP-ASUS and WAP-LINKSYS correspond to lab-captured machine activity power consumption.
|
NUCPC-0, NUCPC-1, WAP-ASUS and WAP-LINKSYS correspond to lab-captured machine activity power consumption.
|
||||||
A commercial solution \cite{hidden-palitronica}, placed in series with the main power cable, measures the global power consumption of the machine.
|
A commercial solution \cite{palitronica}, placed in series with the main power cable, measures the global power consumption of the machine.
|
||||||
We considered two types of machines.
|
We considered two types of machines.
|
||||||
The NUCPC-* are small form factor general-purpose computers.
|
The NUCPC-* are small form factor general-purpose computers.
|
||||||
The WAP-* are wireless access points from two different brands.
|
The WAP-* are wireless access points from two different brands.
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue