better draft
This commit is contained in:
parent
f472cb0ea6
commit
8f2034e282
2 changed files with 63 additions and 5 deletions
|
|
@ -11,4 +11,61 @@ bpv:
|
||||||
value: IEEE International Conference on Software Quality, Reliability and Security
|
value: IEEE International Conference on Software Quality, Reliability and Security
|
||||||
short: QRS 2023
|
short: QRS 2023
|
||||||
location: Chiang Mai, Thailand
|
location: Chiang Mai, Thailand
|
||||||
|
|
||||||
|
wip-bpv:
|
||||||
|
type: Article
|
||||||
|
title: "Work-in-Progress: Boot Sequence Integrity Verification with Power Analysis"
|
||||||
|
author:
|
||||||
|
- Grisel-Davy, Arthur
|
||||||
|
- Bhogayata, Amrita Milan
|
||||||
|
- Pabbi, Srijan
|
||||||
|
- Narayan, Apurva
|
||||||
|
- Fischmeister, Sebastian
|
||||||
|
date: 2022-10-07
|
||||||
|
parent:
|
||||||
|
- type: Conference
|
||||||
|
title:
|
||||||
|
value: 2022 International Conference on Embedded Software
|
||||||
|
short: EMSOFT 2022
|
||||||
|
location: Shanghai, China
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
eet1:
|
||||||
|
type: Article
|
||||||
|
title: "Side-channel Based Runtime Intrusion Detection for Network Equipment"
|
||||||
|
author:
|
||||||
|
- Grisel-Davy, Arthur
|
||||||
|
- Guler, Goksen
|
||||||
|
- Dicket, Julian
|
||||||
|
- Vibien, Philippe,
|
||||||
|
- Khan, Waleed,
|
||||||
|
- Morgan, Jack,
|
||||||
|
- Moreno, Carlos,
|
||||||
|
- Fischmeister, Sebastian
|
||||||
|
date: 2023-09-22
|
||||||
|
parent:
|
||||||
|
- type: Conference
|
||||||
|
title:
|
||||||
|
value: 5th Workshop on Machine Learning for CyberSecurity
|
||||||
|
short: MLCS 2023
|
||||||
|
location: Torino, Italy
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
mad:
|
||||||
|
type: Article
|
||||||
|
title: "MAD: One-Shot Machine Activity Detector for Physics-Based Cyber Security"
|
||||||
|
author:
|
||||||
|
- Grisel-Davy, Arthur
|
||||||
|
- Fischmeister, Sebastian
|
||||||
|
date: 2023-10-22
|
||||||
|
parent:
|
||||||
|
- type: Conference
|
||||||
|
title:
|
||||||
|
value: IEEE International Conference on Software Quality, Reliability and Security
|
||||||
|
short: QRS 2023
|
||||||
|
location: Chiang Mai, Thailand
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -17,19 +17,19 @@ I have supervised Arthur first in 2019 when he was a visiting student discoverin
|
||||||
Building on all the previous projects he was involved in, he decided to dedicate his studies to the use of side channel information for intrusion detection and he is now a third year Ph.D. candidate.
|
Building on all the previous projects he was involved in, he decided to dedicate his studies to the use of side channel information for intrusion detection and he is now a third year Ph.D. candidate.
|
||||||
|
|
||||||
The first project Arthur took part in explored the potential of side-channel analysis for defensive applications on embedded systems.
|
The first project Arthur took part in explored the potential of side-channel analysis for defensive applications on embedded systems.
|
||||||
This work led to the publication of a paper in ...
|
This work led to the publication of a paper in @eet1.
|
||||||
The results from this first project highlighted several axis for future work on bootup verification, runtime analysis and log verification.
|
The results from this first project highlighted several axis for future work on bootup verification, runtime analysis and log verification.
|
||||||
Arthur dedicated his Ph.D. to this topic and eventually explored all these branches of phycis-based defense.
|
Arthur dedicated his Ph.D. to this topic and eventually explored all these branches of phycis-based defense.
|
||||||
|
|
||||||
After the exploration phase, Arthur worked on bootup verification.
|
After the exploration phase, Arthur worked on bootup verification.
|
||||||
He proposed an approach for the problem of assessing the integrity of a machine using only a few known-good examples of bootup traces.
|
He proposed an approach for the problem of assessing the integrity of a machine using only a few known-good examples of bootup traces.
|
||||||
This approach led to two publications: first a work-in-progress paper in ... and then an aticle presented in @bpv that present the approach in more details and use-cases.
|
This approach led to two publications: first a work-in-progress paper in @wip-bpv and then an aticle presented in @bpv that present the approach in more details and use-cases.
|
||||||
For each of these articles, Arthur was the main author and had to write all the publications, integrate reviewers comments, and travel to the conferences to present his work.
|
For each of these articles, Arthur was the main author and had to write all the publications, integrate reviewers comments, and travel to the conferences to present his work.
|
||||||
These were his first experiences with the presentation of researhc work.
|
These were his first experiences with the presentation of researhc work.
|
||||||
|
|
||||||
The second axis of research that Arthur explored was the runtime verification ofembedded systems.
|
The second axis of research that Arthur explored was the runtime verification ofembedded systems.
|
||||||
With the goal to bridge the gap between raw side-channel information and rule-based intrusion detection systems, Arthur developped a few-shot pattern-recognition algorithm for univariate time series.
|
With the goal to bridge the gap between raw side-channel information and rule-based intrusion detection systems, Arthur developped a few-shot pattern-recognition algorithm for univariate time series.
|
||||||
His work was published at ... and received the best paper awart for this edition.
|
His work was published at @mad and received the best paper awart for this edition.
|
||||||
|
|
||||||
Arthur's current project aims at verifying the logs emmited by a machine using the power consumption, providing more trust to the log for later evaluation.
|
Arthur's current project aims at verifying the logs emmited by a machine using the power consumption, providing more trust to the log for later evaluation.
|
||||||
|
|
||||||
|
|
@ -40,7 +40,8 @@ Other collaborations natturally spawend with other students, for example on the
|
||||||
|
|
||||||
Arthur also took the opportunity of his Ph.D. studies to learn new topics for personnal research projects.
|
Arthur also took the opportunity of his Ph.D. studies to learn new topics for personnal research projects.
|
||||||
He proposed to learn PCB design to build a new power trace capture system for USB-C charging cables.
|
He proposed to learn PCB design to build a new power trace capture system for USB-C charging cables.
|
||||||
He also reached out to other labs to explore his idea of using power cables as bi-directional covert channels.
|
He also reached out to other labs in the university to explore his idea of using power cables as bi-directional covert channels.
|
||||||
|
Outside of the university, Arthur often collaborate with the Palitronica Inc. startup on designing detection algorithms or evaluating applications in the domain of side-channel defense.
|
||||||
|
|
||||||
Arthur has consistently demonstrated dedication, creativity, and scholarly achievement throughout his studies in our research group.
|
Arthur has consistently demonstrated dedication, creativity, and scholarly achievement throughout his studies in our research group.
|
||||||
His commitment to advancing the field of cybersecurity and privacy is evident in his motivation, ideas, accomplishments, and publications in reputable conferences.
|
His commitment to advancing the field of cybersecurity and privacy is evident in his motivation, ideas, accomplishments, and publications in reputable conferences.
|
||||||
|
|
@ -49,5 +50,5 @@ Arthur is a person of integrity, professionalism, and a collaborative spirit, ma
|
||||||
|
|
||||||
I believe that Arthur Grisel-Davy would be a deserving recipient of this scolarship.
|
I believe that Arthur Grisel-Davy would be a deserving recipient of this scolarship.
|
||||||
|
|
||||||
|
#pagebreak()
|
||||||
#bibliography("biblio.yml")
|
#bibliography("biblio.yml")
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue