add conclusion frame
This commit is contained in:
parent
7127fb9886
commit
94462b973b
1 changed files with 36 additions and 14 deletions
|
|
@ -21,6 +21,8 @@
|
||||||
\author{Arthur Grisel-Davy}
|
\author{Arthur Grisel-Davy}
|
||||||
\institute{University of Waterloo, Canada}
|
\institute{University of Waterloo, Canada}
|
||||||
|
|
||||||
|
\renewcommand{\thempfootnote}{\ifcase\value{mpfootnote}\or\textasteriskcentered\or\textdagger\or\textdaggerdbl\fi}
|
||||||
|
|
||||||
\begin{document}
|
\begin{document}
|
||||||
|
|
||||||
\maketitle
|
\maketitle
|
||||||
|
|
@ -55,49 +57,49 @@
|
||||||
\end{frame}
|
\end{frame}
|
||||||
|
|
||||||
\begin{frame}{Threat Model}
|
\begin{frame}{Threat Model}
|
||||||
\only<1>{\begin{tcolorbox}[colback=yellow!5!white,colframe=yellow!50!black,
|
\only<1>{\begin{tcolorbox}[colback=orange!5!white,colframe=orange!50!black,
|
||||||
colbacktitle=yellow!75!black,title=Firmware Manipulation]
|
colbacktitle=orange!75!black,title=Firmware Manipulation]
|
||||||
Change settings, upgrade/downgrade firmware, Replace firmware.
|
Change settings, upgrade/downgrade firmware, Replace firmware.
|
||||||
\tcblower
|
\tcblower
|
||||||
Machine takeover, Advanced Persistent Threats.
|
Machine takeover, Advanced Persistent Threats.
|
||||||
\end{tcolorbox}
|
\end{tcolorbox}
|
||||||
|
|
||||||
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
\begin{tcolorbox}[colback=orange!75!black,colframe=orange!50!black, coltext=white]
|
||||||
Runtime Monitoring
|
Runtime Monitoring
|
||||||
\end{tcolorbox}
|
\end{tcolorbox}
|
||||||
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
\begin{tcolorbox}[colback=orange!75!black,colframe=orange!50!black, coltext=white]
|
||||||
Hardware Tampering
|
Hardware Tampering
|
||||||
\end{tcolorbox}
|
\end{tcolorbox}
|
||||||
}
|
}
|
||||||
|
|
||||||
\only<2>{
|
\only<2>{
|
||||||
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
\begin{tcolorbox}[colback=orange!75!black,colframe=orange!50!black, coltext=white]
|
||||||
Firmware Manipulation
|
Firmware Manipulation
|
||||||
\end{tcolorbox}
|
\end{tcolorbox}
|
||||||
|
|
||||||
\begin{tcolorbox}[colback=yellow!5!white,colframe=yellow!50!black,
|
\begin{tcolorbox}[colback=orange!5!white,colframe=orange!50!black,
|
||||||
colbacktitle=yellow!75!black,title=Runtime Monitoring]
|
colbacktitle=orange!75!black,title=Runtime Monitoring]
|
||||||
Log tampering, login (brute force/dictionary) attacks.
|
Log tampering, login (brute force/dictionary) attacks.
|
||||||
\tcblower
|
\tcblower
|
||||||
Intrusion, Covert operations.
|
Intrusion, Covert operations.
|
||||||
\end{tcolorbox}
|
\end{tcolorbox}
|
||||||
|
|
||||||
|
|
||||||
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
\begin{tcolorbox}[colback=orange!75!black,colframe=orange!50!black, coltext=white]
|
||||||
Runtim Monitoring
|
Runtim Monitoring
|
||||||
\end{tcolorbox}
|
\end{tcolorbox}
|
||||||
}
|
}
|
||||||
|
|
||||||
\only<3>{
|
\only<3>{
|
||||||
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
\begin{tcolorbox}[colback=orange!75!black,colframe=orange!50!black, coltext=white]
|
||||||
Firmware Manipulation
|
Firmware Manipulation
|
||||||
\end{tcolorbox}
|
\end{tcolorbox}
|
||||||
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
\begin{tcolorbox}[colback=orange!75!black,colframe=orange!50!black, coltext=white]
|
||||||
Runtim Monitoring
|
Runtim Monitoring
|
||||||
\end{tcolorbox}
|
\end{tcolorbox}
|
||||||
|
|
||||||
\begin{tcolorbox}[colback=yellow!5!white,colframe=yellow!50!black,
|
\begin{tcolorbox}[colback=orange!5!white,colframe=orange!50!black,
|
||||||
colbacktitle=yellow!75!black,title=Hardware Tampering]
|
colbacktitle=orange!75!black,title=Hardware Tampering]
|
||||||
Installation/removal of peripherals.
|
Installation/removal of peripherals.
|
||||||
\tcblower
|
\tcblower
|
||||||
MAC Flooding attacks.
|
MAC Flooding attacks.
|
||||||
|
|
@ -246,6 +248,26 @@ Experiment 1: Detecting SSH Login Attempts
|
||||||
\end{frame}
|
\end{frame}
|
||||||
|
|
||||||
\begin{frame}{Conclusion}
|
\begin{frame}{Conclusion}
|
||||||
|
\only<1>{
|
||||||
|
\begin{tcolorbox}[colback=orange!5!white,colframe=orange!50!black,
|
||||||
|
colbacktitle=orange!75!black,title=Advantages of Physics-Based IDS]
|
||||||
|
\begin{itemize}
|
||||||
|
\item Host-independance
|
||||||
|
\item Trustworthy input data
|
||||||
|
\item
|
||||||
|
\end{itemize}
|
||||||
|
\end{tcolorbox}
|
||||||
|
|
||||||
|
\begin{tcolorbox}[colback=orange!5!white,colframe=orange!50!black,
|
||||||
|
colbacktitle=orange!75!black,title=Capabilities]
|
||||||
|
\begin{itemize}
|
||||||
|
\item Boot Process Assessement \footnote{Work-in-Progress: Boot Sequence Integrity Verification with Power Analysis, EMSOFT 22}.
|
||||||
|
|
||||||
|
\item Run-time Monitoring / Log Verification.
|
||||||
|
\item Hardware Tampering Detection.
|
||||||
|
\end{itemize}
|
||||||
|
\end{tcolorbox}
|
||||||
|
}
|
||||||
\end{frame}
|
\end{frame}
|
||||||
|
|
||||||
\end{document}
|
\end{document}
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue