update
This commit is contained in:
parent
5f2cb74c7b
commit
941650e6be
1 changed files with 3 additions and 2 deletions
|
|
@ -51,8 +51,9 @@ Side channel analysis offers several advantages over traditional machine monitor
|
|||
The low intrusiveness, independence with the host, data reliability and difficulty to bypass are compelling arguments for using involuntary emissions as input for security policies.
|
||||
However, side-channel information often comes in the form of unlabeled time series representing a proxy variable of the activity.
|
||||
Enabling the definition and enforcement of high-level security policies requires extracting the state or activity of the system.
|
||||
We present in this paper a novel time series, one-shot classifier called \gls{mad} specifically designed and evaluated for side-channel analysis.
|
||||
\gls{mad} outperforms other traditional state detection solutions in terms of accuracy and, as importantly, Levenshtein distance of the state sequence.
|
||||
We present in this paper a novel time series, one-shot classifier called Machine Activity Detector (MAD) specifically designed and evaluated for side-channel analysis.
|
||||
We evaluate MAD in two case studies on a variety of machines and datasets where it outperforms other traditional state detection solutions.
|
||||
Results of state detection with MAD enable the definition and verification of high-level security rules to detect various attacks without any interaction with the monitored machine.
|
||||
\end{abstract}
|
||||
%\IEEEoverridecommandlockouts
|
||||
%\vspace{1.5ex}
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue