upkeep
This commit is contained in:
parent
8f2034e282
commit
9fa811ffc2
2 changed files with 113 additions and 13 deletions
101
lv/capture_presentation/power_pipeline.svg
Normal file
101
lv/capture_presentation/power_pipeline.svg
Normal file
|
|
@ -0,0 +1,101 @@
|
|||
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
||||
<!-- Created with Inkscape (http://www.inkscape.org/) -->
|
||||
|
||||
<svg
|
||||
width="210mm"
|
||||
height="122.51682mm"
|
||||
viewBox="0 0 210 122.51682"
|
||||
version="1.1"
|
||||
id="svg1"
|
||||
inkscape:version="1.3.2 (091e20ef0f, 2023-11-25, custom)"
|
||||
sodipodi:docname="power_pipeline.svg"
|
||||
xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape"
|
||||
xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd"
|
||||
xmlns="http://www.w3.org/2000/svg"
|
||||
xmlns:svg="http://www.w3.org/2000/svg">
|
||||
<sodipodi:namedview
|
||||
id="namedview1"
|
||||
pagecolor="#ffffff"
|
||||
bordercolor="#000000"
|
||||
borderopacity="0.25"
|
||||
inkscape:showpageshadow="2"
|
||||
inkscape:pageopacity="0.0"
|
||||
inkscape:pagecheckerboard="0"
|
||||
inkscape:deskcolor="#d1d1d1"
|
||||
inkscape:document-units="mm"
|
||||
inkscape:zoom="2.0283687"
|
||||
inkscape:cx="218.1556"
|
||||
inkscape:cy="131.87937"
|
||||
inkscape:window-width="1920"
|
||||
inkscape:window-height="1011"
|
||||
inkscape:window-x="0"
|
||||
inkscape:window-y="0"
|
||||
inkscape:window-maximized="1"
|
||||
inkscape:current-layer="layer1" />
|
||||
<defs
|
||||
id="defs1" />
|
||||
<g
|
||||
inkscape:label="Layer 1"
|
||||
inkscape:groupmode="layer"
|
||||
id="layer1">
|
||||
<rect
|
||||
style="fill:#b3b3b3;stroke:#999999;stroke-width:1;stroke-linecap:round"
|
||||
id="rect1"
|
||||
width="13.154083"
|
||||
height="12.202177"
|
||||
x="11.655968"
|
||||
y="16.369371"
|
||||
ry="0" />
|
||||
<rect
|
||||
style="fill:#1a1a1a;stroke:none;stroke-width:1;stroke-linecap:round"
|
||||
id="rect2"
|
||||
width="6.5770416"
|
||||
height="12.202177"
|
||||
x="18.233009"
|
||||
y="16.369371" />
|
||||
<rect
|
||||
style="fill:#1a1a1a;stroke:none;stroke-width:1;stroke-linecap:round"
|
||||
id="rect3"
|
||||
width="3.2714958"
|
||||
height="12.202177"
|
||||
x="11.655968"
|
||||
y="16.369371" />
|
||||
<path
|
||||
style="fill:none;stroke:#333333;stroke-width:1;stroke-linecap:round"
|
||||
d="M 16.652684,6.2262921 V 50.127569"
|
||||
id="path1"
|
||||
sodipodi:nodetypes="cc" />
|
||||
<path
|
||||
style="fill:#1a1a1a;stroke:#333333;stroke-width:1;stroke-linecap:round"
|
||||
d="M 24.810051,22.47046 H 47.472007"
|
||||
id="path3" />
|
||||
<rect
|
||||
style="fill:#1a1a1a;stroke:#333333;stroke-width:1;stroke-linecap:round"
|
||||
id="rect4"
|
||||
width="5.5753527"
|
||||
height="15.447133"
|
||||
x="13.865007"
|
||||
y="50.627571" />
|
||||
<path
|
||||
style="fill:none;stroke:#333333;stroke-width:1;stroke-linecap:round"
|
||||
d="M 16.652684,66.574706 V 110.47598"
|
||||
id="path4"
|
||||
sodipodi:nodetypes="cc" />
|
||||
<path
|
||||
style="fill:#1a1a1a;stroke:#333333;stroke-width:1;stroke-linecap:round"
|
||||
d="m 19.44036,58.351138 28.031647,0"
|
||||
id="path5"
|
||||
sodipodi:nodetypes="cc" />
|
||||
<text
|
||||
xml:space="preserve"
|
||||
style="font-size:3.175px;font-family:Fuji;-inkscape-font-specification:Fuji;fill:#1a1a1a;stroke:none;stroke-width:1;stroke-linecap:round"
|
||||
x="28.917238"
|
||||
y="17.036184"
|
||||
id="text5"><tspan
|
||||
sodipodi:role="line"
|
||||
id="tspan5"
|
||||
style="stroke:none;stroke-width:1"
|
||||
x="28.917238"
|
||||
y="17.036184">Hall-Effect Sensor</tspan></text>
|
||||
</g>
|
||||
</svg>
|
||||
|
After Width: | Height: | Size: 3.1 KiB |
|
|
@ -10,11 +10,10 @@
|
|||
|
||||
|
||||
|
||||
|
||||
I am recommending Arthur Grisel-Davy for the Cybersecurity and Privacy Excellence Graduate Scholarships.
|
||||
|
||||
I have supervised Arthur first in 2019 when he was a visiting student discovering the world of research, and then again since 2021 and until now during his doctoral studies.
|
||||
Building on all the previous projects he was involved in, he decided to dedicate his studies to the use of side channel information for intrusion detection and he is now a third year Ph.D. candidate.
|
||||
I supervised Arthur first in 2019 when he was a visiting student discovering the world of research, and then again in 2021 during his doctoral studies.
|
||||
Building on all the previous projects he was involved in, he decided to dedicate his studies to the use of side-channel information for intrusion detection. He is now a third-year Ph.D. candidate.
|
||||
|
||||
The first project Arthur took part in explored the potential of side-channel analysis for defensive applications on embedded systems.
|
||||
This work led to the publication of a paper in @eet1.
|
||||
|
|
@ -25,30 +24,30 @@ After the exploration phase, Arthur worked on bootup verification.
|
|||
He proposed an approach for the problem of assessing the integrity of a machine using only a few known-good examples of bootup traces.
|
||||
This approach led to two publications: first a work-in-progress paper in @wip-bpv and then an aticle presented in @bpv that present the approach in more details and use-cases.
|
||||
For each of these articles, Arthur was the main author and had to write all the publications, integrate reviewers comments, and travel to the conferences to present his work.
|
||||
These were his first experiences with the presentation of researhc work.
|
||||
These were his first experiences with the presentation of research work.
|
||||
|
||||
The second axis of research that Arthur explored was the runtime verification of embedded systems.
|
||||
With the goal to bridge the gap between raw side-channel information and rule-based intrusion detection systems, Arthur developped a few-shot pattern-recognition algorithm for univariate time series.
|
||||
His work was published at @mad and received the best paper awart for this edition.
|
||||
Arthur developed a few-shot pattern recognition algorithm for univariate time series to bridge the gap between raw side-channel information and rule-based intrusion detection systems.
|
||||
His work was published at @mad and received the best paper award for this edition.
|
||||
|
||||
Arthur's current project aims at verifying the logs emmited by a machine using the power consumption, providing more trust to the log for later evaluation.
|
||||
Arthur's current project aims to verify the logs emitted by a machine using power consumption, providing more trust to the log for later evaluation.
|
||||
|
||||
Along his studies, Arthur also undertook the role of advisor for younger students.
|
||||
Along with his studies, Arthur also undertook the advisor role for younger students.
|
||||
He shares his experience of conducting experiments and writing articles with a few students each term.
|
||||
This role led to multiple collaborations on topics like the study of power consumption patterns from battery-powered devices or pattern mining algorithms.
|
||||
Other collaborations natturally spawend with other students, for example on the topic of system's trust management.
|
||||
Collaborations naturally arise with other students, for example, on the topic of trust management.
|
||||
|
||||
Arthur also took the opportunity of his Ph.D. studies to learn new topics for personnal research projects.
|
||||
Arthur also took the opportunity of his Ph.D. studies to learn new topics for personal research projects.
|
||||
He proposed to learn PCB design to build a new power trace capture system for USB-C charging cables.
|
||||
He also reached out to other labs in the university to explore his idea of using power cables as bi-directional covert channels.
|
||||
Outside of the university, Arthur often collaborate with the Palitronica Inc. startup on designing detection algorithms or evaluating applications in the domain of side-channel defense.
|
||||
Outside of the university, Arthur often collaborates with the Palitronica Inc. startup on designing detection algorithms or evaluating applications in the domain of side-channel defense.
|
||||
|
||||
Arthur has consistently demonstrated dedication, creativity, and scholarly achievement throughout his studies in our research group.
|
||||
His commitment to advancing the field of cybersecurity and privacy is evident in his motivation, ideas, accomplishments, and publications in reputable conferences.
|
||||
|
||||
Arthur is a person of integrity, professionalism, and a collaborative spirit, making him a valuable member of our academic community.
|
||||
|
||||
I believe that Arthur Grisel-Davy would be a deserving recipient of this scolarship.
|
||||
Arthur Grisel-Davy would be a deserving recipient of this scholarship.
|
||||
|
||||
#pagebreak()
|
||||
#bibliography("biblio.yml")
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue