diff --git a/PhD/research_proposal/images/main_illustration.pdf b/PhD/research_proposal/images/main_illustration.pdf new file mode 100644 index 0000000..e657172 Binary files /dev/null and b/PhD/research_proposal/images/main_illustration.pdf differ diff --git a/PhD/research_proposal/images/main_illustration_p1.pdf b/PhD/research_proposal/images/main_illustration_p1.pdf index 2d3dfa3..aacf10b 100644 Binary files a/PhD/research_proposal/images/main_illustration_p1.pdf and b/PhD/research_proposal/images/main_illustration_p1.pdf differ diff --git a/PhD/research_proposal/images/main_illustration_p2.pdf b/PhD/research_proposal/images/main_illustration_p2.pdf index 046a3a5..05abcd2 100644 Binary files a/PhD/research_proposal/images/main_illustration_p2.pdf and b/PhD/research_proposal/images/main_illustration_p2.pdf differ diff --git a/PhD/research_proposal/images/main_illustration_p3.pdf b/PhD/research_proposal/images/main_illustration_p3.pdf index 2b7a93a..ca4943e 100644 Binary files a/PhD/research_proposal/images/main_illustration_p3.pdf and b/PhD/research_proposal/images/main_illustration_p3.pdf differ diff --git a/PhD/research_proposal/images/main_illustration_p4.pdf b/PhD/research_proposal/images/main_illustration_p4.pdf index c0c54f1..d7d855a 100644 Binary files a/PhD/research_proposal/images/main_illustration_p4.pdf and b/PhD/research_proposal/images/main_illustration_p4.pdf differ diff --git a/PhD/research_proposal/presentation.tex b/PhD/research_proposal/presentation.tex index f169826..8b56e7e 100644 --- a/PhD/research_proposal/presentation.tex +++ b/PhD/research_proposal/presentation.tex @@ -38,11 +38,11 @@ \end{center} \end{frame} -\begin{frame}{Introduction} - \begin{center} - {\LARGE 2. Process assessement require process-related information.} - \end{center} -\end{frame} +%\begin{frame}{Introduction} +% \begin{center} +% {\LARGE 2. Process assessement require process-related information.} +% \end{center} +%\end{frame} \begin{frame}{Introduction} \begin{center} @@ -84,90 +84,103 @@ \end{columns} \end{frame} -\begin{frame}{Prelimirary Work - EET1} - \begin{figure} - \centering - \includegraphics[width=\textwidth]{images/overview_eet1.pdf} - \end{figure} - Attacks: Firmware Changes, SSH Logs Tempering, Hardware Tempering + +\begin{frame}{Preliminary Work} + % Figure from the EMSOFT presentation with the different side channels and our solution + \begin{center} + \only<1>{\includegraphics[width=\textwidth]{images/timeline_pastwork_p1.pdf}} + \only<2>{\includegraphics[width=\textwidth]{images/timeline_pastwork_p2.pdf}} + \only<3>{\includegraphics[width=\textwidth]{images/timeline_pastwork_p3.pdf}} + \only<4>{\includegraphics[width=\textwidth]{images/timeline_pastwork_p4.pdf}} + \only<5>{\includegraphics[width=\textwidth]{images/timeline_pastwork_p5.pdf}} + \only<6>{\includegraphics[width=\textwidth]{images/timeline_pastwork_p6.pdf}} + \end{center} \end{frame} -\begin{frame}{Prelimirary Work - EET1: Firmware} - \begin{figure} - \centering - \includegraphics[height=0.9\textheight]{images/Firmware_Comparison_TD_direct.pdf} - \end{figure} -\end{frame} +%\begin{frame}{Prelimirary Work - EET1} +% \begin{figure} +% \centering +% \includegraphics[width=\textwidth]{images/overview_eet1.pdf} +% \end{figure} +% Attacks: Firmware Changes, SSH Logs Tempering, Hardware Tempering +%\end{frame} +% +%\begin{frame}{Prelimirary Work - EET1: Firmware} +% \begin{figure} +% \centering +% \includegraphics[height=0.9\textheight]{images/Firmware_Comparison_TD_direct.pdf} +% \end{figure} +%\end{frame} +% +%\begin{frame}{Prelimirary Work - EET1: Firmware} +% \begin{table}[ht] +% \centering +% \begin{tabular}{lccc} +% \toprule +% \textbf{Attack} & \textbf{Model} & \textbf{F1 Score} & \textbf{Accuracy} \tabularnewline +% \midrule +% \multirow{2}*{Firmware Changes DC} & RFC & \numprint[\%]{100} & \numprint[\%]{100} \tabularnewline +% & SVM & \numprint[\%]{96.8} & \numprint[\%]{99.3}\tabularnewline +% \midrule +% \multirow{3}*{SSH Logs Tempering}& RFC & \numprint[\%]{95} & \numprint[\%]{97} \tabularnewline +% & SVM & \numprint[\%]{96} & \numprint[\%]{98} \tabularnewline +% & 1D-CNN & \numprint[\%]{93} & \numprint[\%]{96} \tabularnewline +% \midrule +% \multirow{3}*{Hardware Tempering} & DC SVM & & \numprint[\%]{100} \tabularnewline +% & DC KNN & & \numprint[\%]{100} \tabularnewline +% & AC SVM & & \numprint[\%]{99.5} \tabularnewline +% \bottomrule +% \end{tabular} +%\end{table} +% +% \footnote{Published in \textit{Side-channel Based Runtime Intrusion Detection for Network Equipment} at MLCS (Workshop of ECML-PKDD 2023)} +%\end{frame} +% +%\begin{frame}{ Preliminary Work - xPSU} +% \begin{figure} +% \centering +% \includegraphics[height=0.9\textheight]{images/xpsu_illustration.pdf} +% \end{figure} +%\end{frame} +% +%\begin{frame}{Preliminary Work - SDS \& BPV} +% \begin{figure} +% \centering +% \includegraphics[width=\textwidth]{images/sds_illustration.pdf} +% \end{figure} +%\end{frame} +% +%\begin{frame}{Preliminary Work - SDS \& BPV} +% \begin{figure} +% \centering +% \includegraphics[width=0.9\textwidth]{images/training_bpv.pdf} +% \end{figure} +%\end{frame} +% +%\begin{frame}{Preliminary Work - SDS \& BPV} +%\begin{table}[ht] +%\centering +%\begin{tabular}{lccc} +% \toprule +% \textbf{Test Case} & \textbf{Experiment} & \textbf{F1 Score} \tabularnewline +% \toprule +% \multirow{4}*{Network Devices} & TP-Link switch & 0.87\tabularnewline +% & HP switch & 0.98 \tabularnewline +% & Asus Router & 1.00\tabularnewline +% & Linksys Router & 0.92\tabularnewline +% \midrule +% \multirow{4}*{Drone} & Original & 1.00\tabularnewline +% & Compiled & 1.00\tabularnewline +% & Low Battery & 1.00\tabularnewline +% & Bootloader Bug & 1.00\tabularnewline +% \bottomrule +%\end{tabular} +%\end{table} +% \footnote{Published in \textit{Work-in-Progress: Boot Sequence Integrity Verification with Power Analysis} at EMSOFT 2022\\ +% and in \textit{Independent Boot Process Verification using Side-Channel Power Analysis} at QRS 2023} +%\end{frame} -\begin{frame}{Prelimirary Work - EET1: Firmware} - \begin{table}[ht] - \centering - \begin{tabular}{lccc} - \toprule - \textbf{Attack} & \textbf{Model} & \textbf{F1 Score} & \textbf{Accuracy} \tabularnewline - \midrule - \multirow{2}*{Firmware Changes DC} & RFC & \numprint[\%]{100} & \numprint[\%]{100} \tabularnewline - & SVM & \numprint[\%]{96.8} & \numprint[\%]{99.3}\tabularnewline - \midrule - \multirow{3}*{SSH Logs Tempering}& RFC & \numprint[\%]{95} & \numprint[\%]{97} \tabularnewline - & SVM & \numprint[\%]{96} & \numprint[\%]{98} \tabularnewline - & 1D-CNN & \numprint[\%]{93} & \numprint[\%]{96} \tabularnewline - \midrule - \multirow{3}*{Hardware Tempering} & DC SVM & & \numprint[\%]{100} \tabularnewline - & DC KNN & & \numprint[\%]{100} \tabularnewline - & AC SVM & & \numprint[\%]{99.5} \tabularnewline - \bottomrule - \end{tabular} -\end{table} - - \footnote{Published in \textit{Side-channel Based Runtime Intrusion Detection for Network Equipment} at MLCS (Workshop of ECML-PKDD 2023)} -\end{frame} - -\begin{frame}{ Preliminary Work - xPSU} - \begin{figure} - \centering - \includegraphics[height=0.9\textheight]{images/xpsu_illustration.pdf} - \end{figure} -\end{frame} - -\begin{frame}{Preliminary Work - SDS \& BPV} - \begin{figure} - \centering - \includegraphics[width=\textwidth]{images/sds_illustration.pdf} - \end{figure} -\end{frame} - -\begin{frame}{Preliminary Work - SDS \& BPV} - \begin{figure} - \centering - \includegraphics[width=0.9\textwidth]{images/training_bpv.pdf} - \end{figure} -\end{frame} - -\begin{frame}{Preliminary Work - SDS \& BPV} -\begin{table}[ht] -\centering -\begin{tabular}{lccc} - \toprule - \textbf{Test Case} & \textbf{Experiment} & \textbf{F1 Score} \tabularnewline - \toprule - \multirow{4}*{Network Devices} & TP-Link switch & 0.87\tabularnewline - & HP switch & 0.98 \tabularnewline - & Asus Router & 1.00\tabularnewline - & Linksys Router & 0.92\tabularnewline - \midrule - \multirow{4}*{Drone} & Original & 1.00\tabularnewline - & Compiled & 1.00\tabularnewline - & Low Battery & 1.00\tabularnewline - & Bootloader Bug & 1.00\tabularnewline - \bottomrule -\end{tabular} -\end{table} - \footnote{Published in \textit{Work-in-Progress: Boot Sequence Integrity Verification with Power Analysis} at EMSOFT 2022\\ - and in \textit{Independent Boot Process Verification using Side-Channel Power Analysis} at QRS 2023} -\end{frame} - -\begin{frame}{Overview} +\begin{frame}{Future Work} \begin{figure} \centering \includegraphics[width=\textwidth]{images/intro_dsd.pdf} @@ -192,26 +205,26 @@ \end{center} \end{frame} -\begin{frame}{Planned Work - SSSM} +\begin{frame}{Current Work - SSSM} \begin{figure} \centering \includegraphics[width=0.9\textwidth]{images/dsd_illustration.pdf} \end{figure} \end{frame} -\begin{frame}{Planned Work - SSSM} +\begin{frame}{Current Work - SSSM} \begin{figure} \centering \includegraphics[width=0.9\textwidth]{images/dsd_acc.pdf} \end{figure} \end{frame} -\begin{frame}{Planned Work - SSSM} +\begin{frame}{Current Work - SSSM} \begin{figure} \centering \includegraphics[width=0.9\textwidth]{images/preds.pdf} \end{figure} \end{frame} -\begin{frame}{Planned Work - SSSM} +\begin{frame}{Current Work - SSSM} Next Steps: \begin{itemize} \item Evaluate performances on a wider range of devices.