fix abstract
This commit is contained in:
parent
3c112a4989
commit
621854bb39
1 changed files with 4 additions and 4 deletions
|
|
@ -50,10 +50,10 @@
|
||||||
\maketitle
|
\maketitle
|
||||||
\begin{abstract}
|
\begin{abstract}
|
||||||
Side channel analysis offers several advantages over traditional machine monitoring methods.
|
Side channel analysis offers several advantages over traditional machine monitoring methods.
|
||||||
The low intrusiveness, independence with the host, data reliability and difficulty to bypass are compelling arguments for using involuntary emissions as input for security policies.
|
The low intrusiveness, independence with the host, data reliability and difficulty to bypass are compelling arguments for using involuntary emissions as input for enforcing security policies.
|
||||||
However, side-channel information often comes in the form of unlabeled time series representing a proxy variable of the activity.
|
However, side-channel information often comes in the form of unlabeled time series of a proxy variable of the activity.
|
||||||
Enabling the definition and enforcement of high-level security policies requires extracting the state or activity of the system.
|
Enabling the definition and enforcement of high-level security policies requires extracting the state or activity of the system from the input data.
|
||||||
We present in this paper a novel time series, one-shot classifier called Machine Activity Detector (MAD) specifically designed and evaluated for side-channel analysis.
|
We present in this paper a novel time series, one-shot pattern locator and classifier called Machine Activity Detector (MAD) specifically designed and evaluated for side-channel analysis.
|
||||||
We evaluate MAD in two case studies on a variety of machines and datasets where it outperforms other traditional state detection solutions and present formidable performances for security rules enforcement.
|
We evaluate MAD in two case studies on a variety of machines and datasets where it outperforms other traditional state detection solutions and present formidable performances for security rules enforcement.
|
||||||
Results of state detection with MAD enable the definition and verification of high-level security rules to detect various attacks without any interaction with the monitored machine.
|
Results of state detection with MAD enable the definition and verification of high-level security rules to detect various attacks without any interaction with the monitored machine.
|
||||||
\end{abstract}
|
\end{abstract}
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue