add alternative section and complementary projects section

This commit is contained in:
Arthur Grisel-Davy 2023-06-21 10:47:47 -04:00
parent 1726a3fd8f
commit 8dd98b0b9c
3 changed files with 81 additions and 3 deletions

View file

@ -2074,3 +2074,37 @@ series = {UbiComp '10}
doi={10.1109/TVT.2023.3236820}}
@article{cannoles2017hacking,
title={Hacking experiment by using USB rubber ducky scripting},
author={Cannoles, Benjamin and Ghafarian, Ahmad},
journal={Journal of Systemics},
volume={15},
number={2},
pages={6671},
year={2017}
}
@article{NISSIM2017675,
title = {USB-based attacks},
journal = {Computers \& Security},
volume = {70},
pages = {675-688},
year = {2017},
issn = {0167-4048},
doi = {https://doi.org/10.1016/j.cose.2017.08.002},
url = {https://www.sciencedirect.com/science/article/pii/S0167404817301578},
author = {Nir Nissim and Ran Yahalom and Yuval Elovici},
keywords = {USB, Device, Attack, Malicious, Malware},
abstract = {Attackers increasingly take advantage of innocent users who tend to use USB peripherals casually, assuming these peripherals are benign when in fact they may carry an embedded malicious payload that can be used to launch attacks. In recent years, USB peripherals have become an attractive tool for launching cyber-attacks. In this survey, we review 29 different USB-based attacks and utilize our new taxonomy to classify them into four major categories. These attacks target both individuals and organizations; utilize widely used USB peripherals, such as keyboards, mice, flash drives, smartphones etc. For each attack, we address the objective it achieves and identify the associated and vulnerable USB peripherals and hardware.}
}
@inproceedings{su2017usb,
title={USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs.},
author={Su, Yang and Genkin, Daniel and Ranasinghe, Damith Chinthana and Yarom, Yuval},
booktitle={USENIX Security Symposium},
volume={8},
pages={1145--1161},
year={2017}
}

View file

@ -130,5 +130,12 @@ Each type of system is simple in its design and task.
However, adding a designated power monitoring measurement device to each individual system can significantly increase cost, maintenance, and points of failure.
Capturing the power consumption of these machines at a single point could minimize the implementation footprint while maintaining a reliable physics-based monitoring solution.
\section{Multi-Source Multi-Measure}
The MSMM problem is a combination of the previous ones for which a clear application is difficult to imagine.
In an MSMM context, multiple capture systems would each measure an aggregate power consumption to form a multivariate time series.
Each dimension of this time series would incorporate the consumption of one or more individual components.
As long as the capture architecture (i.e., what machine is monitored by which capture system) is known, the analysis is a combination of the methods previously presented.
In the case where the capture architecture is unknown, the problem become out of scope for this thesis.
\section{Conclusion}
\agd{to be filled}

View file

@ -31,12 +31,49 @@ This term will also be dedicated to beginning the design of the multi-source sin
For this third system, the capture system is already available.
The workload is mainly centred on the design of the processing algorithm.
\section{Complementary Projects}
Although it is difficult to plan work after one year, there are some complementary projects that I intend on exploring.
\textbf{Cover Channel:}
Some work in the litterature explored potential of power consumption as a covert channel.
This application is complementary with the defense work I am focusing on in this thesis.
As an attacker trying to exfiltrate information from a machine, understanding the method from generating meaningfull power consumption patterns is crucial.
This work provide insights on how different applications generate specific consumption patterns.
A 1b/s covert channel already successfully extracted a private ECDSA SSH key through AC/DC transformers with an MSSM setup.
I intend on improving the capabilities of this covert channel as a complementary project for this thesis.
\textbf{Specific Activities Detection:}
Some users activities carry so much potential threats that detecting them quickly is interesting.
For example, plugging in a USB device is an entry point for many attacks \cite{cannoles2017hacking, NISSIM2017675, su2017usb}.
Fortunately, USB devices have a direct impact on the power consumption of a machine as they draw their power from the host.
Detecting this specific event enable the collection of trusted logs usefull for forensics or log verification tasks.
The current work on this problem is exploring signal processing methods to build a reliable detector with the least false positive rate while still detecting all USB events.
This problem is complementary to the more general pattern detection problem that this thesis explores as a reduction to practice that, once again, provide a better understanding of the variety of patterns present in a power consumption trace.
\section{Alternative Courses of Action}
Pandemic: continue from my home (already did before)
Many unforseen event can disturb a a research plan on multiple years.
Although it is not possible to plan an alternative course of action for each case, here are some ways to continue this thesis under different conditions.
SSMM and MSSM fails, focuse on improving SSSM
\textbf{Pandemic or Global Lockdown Situation:}
The recent years reminded us that a global lockdown can become a necessity in a matter of months.
Without access to the university, the xork of this thesis remain possible.
Thanks to the great work of all the people at Palitronica Inc. the capture system is deployable anywhere with an internet connection.
Many experiment were already performed outside of the lab and it is even possible to store data on premise for complete offline work.
I already experienced this situation in 2020 when the university closed and I continued the work at home with some lab equipement.
The xPSU project was entirely developped off-campus.
Find other
\textbf{Unconvincing Results:}
The first results of the SSSM problem are encouraging for the eploration of MSSM and SSMM problems.
However, some unforeseen discovery could force to reevaluate the potential of this technology.
As presented before, there is plenty of alternative routes to explore for physics-based \gls{ids}.
First, there is room for improving the performances of the SSSM detector.
A better accuracy, a greater number of states, a lower training requirement or higher time-efficiency are all valuable improvements to pursue.
Second, the range of machines that can benefit from this technology is wide.
Experimentations with different machines for different use-cases can reveal unknown specific challenges.
Finally, complementary projects such as the xPSU, the covert channel, or the specific activities detectors are all interesting projects that would undoubtebly reveal new problems to explore.
%There is no lack of interesting problems to study in the field of physics-based cyber-security.
\section{Publication Goals}
Find conferences/journals to aim for publishing.