diff --git a/PhD/seminar/seminar.typ b/PhD/seminar/seminar.typ new file mode 100644 index 0000000..d1f3b25 --- /dev/null +++ b/PhD/seminar/seminar.typ @@ -0,0 +1,59 @@ +#import "@preview/polylux:0.3.1": * +#import themes.metropolis: * + +#show: metropolis-theme.with( + footer: [CC BY-NC-SA] +) + +#set text(font: "STIX Two Text", weight: "light", size: 20pt) +#show math.equation: set text(font: "STIX Two Text") +#set strong(delta: 100) +#set par(justify: true) + +#title-slide( + author: [Arthur Grisel-Davy], + title: "Seminar: Process-Power Consistency as Sanity Check", + subtitle: "Subtitle", + date: "September 2024", + extra: "" +) + +#slide(title: "State of the IDS")[ + // Most IDS rely on host-based information + // Process List is a very common default info to verify + // Process masquerading is trivialy posible and used by many attacks (Mitre AttCK list) + // Countermeasure to process masquerading +] + +#slide(title:"Process List Verification")[ +// We can't stop using the process list, so let's try to verify it +// Power as a trusted source of information +] + +#slide(title:"Power Side-Channel")[ +// Why is power trusted +// Why is it correlated with the process list +// Why is it the best/most practical side-channel +] + +#slide(title:"Experimental Setup")[ +// Setup of the experiment +// What data to gather + // Log data + // Power data (comparison hardware/software) +// Resulting dataset +] + +#slide(title:"Problem Statement")[ +] + +#slide(title:"Proposed Approach")[ +// Proposed approach +// +] + +#slide(title:"Evaluation")[ +] + +#slide(title:"Future Developements")[ +]