rework after filage

This commit is contained in:
Arthur Grisel-Davy 2023-10-13 20:09:46 -04:00
parent 58536c1968
commit a461b99fab
6 changed files with 103 additions and 90 deletions

Binary file not shown.

View file

@ -38,11 +38,11 @@
\end{center}
\end{frame}
\begin{frame}{Introduction}
\begin{center}
{\LARGE 2. Process assessement require process-related information.}
\end{center}
\end{frame}
%\begin{frame}{Introduction}
% \begin{center}
% {\LARGE 2. Process assessement require process-related information.}
% \end{center}
%\end{frame}
\begin{frame}{Introduction}
\begin{center}
@ -84,90 +84,103 @@
\end{columns}
\end{frame}
\begin{frame}{Prelimirary Work - EET1}
\begin{figure}
\centering
\includegraphics[width=\textwidth]{images/overview_eet1.pdf}
\end{figure}
Attacks: Firmware Changes, SSH Logs Tempering, Hardware Tempering
\begin{frame}{Preliminary Work}
% Figure from the EMSOFT presentation with the different side channels and our solution
\begin{center}
\only<1>{\includegraphics[width=\textwidth]{images/timeline_pastwork_p1.pdf}}
\only<2>{\includegraphics[width=\textwidth]{images/timeline_pastwork_p2.pdf}}
\only<3>{\includegraphics[width=\textwidth]{images/timeline_pastwork_p3.pdf}}
\only<4>{\includegraphics[width=\textwidth]{images/timeline_pastwork_p4.pdf}}
\only<5>{\includegraphics[width=\textwidth]{images/timeline_pastwork_p5.pdf}}
\only<6>{\includegraphics[width=\textwidth]{images/timeline_pastwork_p6.pdf}}
\end{center}
\end{frame}
\begin{frame}{Prelimirary Work - EET1: Firmware}
\begin{figure}
\centering
\includegraphics[height=0.9\textheight]{images/Firmware_Comparison_TD_direct.pdf}
\end{figure}
\end{frame}
%\begin{frame}{Prelimirary Work - EET1}
% \begin{figure}
% \centering
% \includegraphics[width=\textwidth]{images/overview_eet1.pdf}
% \end{figure}
% Attacks: Firmware Changes, SSH Logs Tempering, Hardware Tempering
%\end{frame}
%
%\begin{frame}{Prelimirary Work - EET1: Firmware}
% \begin{figure}
% \centering
% \includegraphics[height=0.9\textheight]{images/Firmware_Comparison_TD_direct.pdf}
% \end{figure}
%\end{frame}
%
%\begin{frame}{Prelimirary Work - EET1: Firmware}
% \begin{table}[ht]
% \centering
% \begin{tabular}{lccc}
% \toprule
% \textbf{Attack} & \textbf{Model} & \textbf{F1 Score} & \textbf{Accuracy} \tabularnewline
% \midrule
% \multirow{2}*{Firmware Changes DC} & RFC & \numprint[\%]{100} & \numprint[\%]{100} \tabularnewline
% & SVM & \numprint[\%]{96.8} & \numprint[\%]{99.3}\tabularnewline
% \midrule
% \multirow{3}*{SSH Logs Tempering}& RFC & \numprint[\%]{95} & \numprint[\%]{97} \tabularnewline
% & SVM & \numprint[\%]{96} & \numprint[\%]{98} \tabularnewline
% & 1D-CNN & \numprint[\%]{93} & \numprint[\%]{96} \tabularnewline
% \midrule
% \multirow{3}*{Hardware Tempering} & DC SVM & & \numprint[\%]{100} \tabularnewline
% & DC KNN & & \numprint[\%]{100} \tabularnewline
% & AC SVM & & \numprint[\%]{99.5} \tabularnewline
% \bottomrule
% \end{tabular}
%\end{table}
%
% \footnote{Published in \textit{Side-channel Based Runtime Intrusion Detection for Network Equipment} at MLCS (Workshop of ECML-PKDD 2023)}
%\end{frame}
%
%\begin{frame}{ Preliminary Work - xPSU}
% \begin{figure}
% \centering
% \includegraphics[height=0.9\textheight]{images/xpsu_illustration.pdf}
% \end{figure}
%\end{frame}
%
%\begin{frame}{Preliminary Work - SDS \& BPV}
% \begin{figure}
% \centering
% \includegraphics[width=\textwidth]{images/sds_illustration.pdf}
% \end{figure}
%\end{frame}
%
%\begin{frame}{Preliminary Work - SDS \& BPV}
% \begin{figure}
% \centering
% \includegraphics[width=0.9\textwidth]{images/training_bpv.pdf}
% \end{figure}
%\end{frame}
%
%\begin{frame}{Preliminary Work - SDS \& BPV}
%\begin{table}[ht]
%\centering
%\begin{tabular}{lccc}
% \toprule
% \textbf{Test Case} & \textbf{Experiment} & \textbf{F1 Score} \tabularnewline
% \toprule
% \multirow{4}*{Network Devices} & TP-Link switch & 0.87\tabularnewline
% & HP switch & 0.98 \tabularnewline
% & Asus Router & 1.00\tabularnewline
% & Linksys Router & 0.92\tabularnewline
% \midrule
% \multirow{4}*{Drone} & Original & 1.00\tabularnewline
% & Compiled & 1.00\tabularnewline
% & Low Battery & 1.00\tabularnewline
% & Bootloader Bug & 1.00\tabularnewline
% \bottomrule
%\end{tabular}
%\end{table}
% \footnote{Published in \textit{Work-in-Progress: Boot Sequence Integrity Verification with Power Analysis} at EMSOFT 2022\\
% and in \textit{Independent Boot Process Verification using Side-Channel Power Analysis} at QRS 2023}
%\end{frame}
\begin{frame}{Prelimirary Work - EET1: Firmware}
\begin{table}[ht]
\centering
\begin{tabular}{lccc}
\toprule
\textbf{Attack} & \textbf{Model} & \textbf{F1 Score} & \textbf{Accuracy} \tabularnewline
\midrule
\multirow{2}*{Firmware Changes DC} & RFC & \numprint[\%]{100} & \numprint[\%]{100} \tabularnewline
& SVM & \numprint[\%]{96.8} & \numprint[\%]{99.3}\tabularnewline
\midrule
\multirow{3}*{SSH Logs Tempering}& RFC & \numprint[\%]{95} & \numprint[\%]{97} \tabularnewline
& SVM & \numprint[\%]{96} & \numprint[\%]{98} \tabularnewline
& 1D-CNN & \numprint[\%]{93} & \numprint[\%]{96} \tabularnewline
\midrule
\multirow{3}*{Hardware Tempering} & DC SVM & & \numprint[\%]{100} \tabularnewline
& DC KNN & & \numprint[\%]{100} \tabularnewline
& AC SVM & & \numprint[\%]{99.5} \tabularnewline
\bottomrule
\end{tabular}
\end{table}
\footnote{Published in \textit{Side-channel Based Runtime Intrusion Detection for Network Equipment} at MLCS (Workshop of ECML-PKDD 2023)}
\end{frame}
\begin{frame}{ Preliminary Work - xPSU}
\begin{figure}
\centering
\includegraphics[height=0.9\textheight]{images/xpsu_illustration.pdf}
\end{figure}
\end{frame}
\begin{frame}{Preliminary Work - SDS \& BPV}
\begin{figure}
\centering
\includegraphics[width=\textwidth]{images/sds_illustration.pdf}
\end{figure}
\end{frame}
\begin{frame}{Preliminary Work - SDS \& BPV}
\begin{figure}
\centering
\includegraphics[width=0.9\textwidth]{images/training_bpv.pdf}
\end{figure}
\end{frame}
\begin{frame}{Preliminary Work - SDS \& BPV}
\begin{table}[ht]
\centering
\begin{tabular}{lccc}
\toprule
\textbf{Test Case} & \textbf{Experiment} & \textbf{F1 Score} \tabularnewline
\toprule
\multirow{4}*{Network Devices} & TP-Link switch & 0.87\tabularnewline
& HP switch & 0.98 \tabularnewline
& Asus Router & 1.00\tabularnewline
& Linksys Router & 0.92\tabularnewline
\midrule
\multirow{4}*{Drone} & Original & 1.00\tabularnewline
& Compiled & 1.00\tabularnewline
& Low Battery & 1.00\tabularnewline
& Bootloader Bug & 1.00\tabularnewline
\bottomrule
\end{tabular}
\end{table}
\footnote{Published in \textit{Work-in-Progress: Boot Sequence Integrity Verification with Power Analysis} at EMSOFT 2022\\
and in \textit{Independent Boot Process Verification using Side-Channel Power Analysis} at QRS 2023}
\end{frame}
\begin{frame}{Overview}
\begin{frame}{Future Work}
\begin{figure}
\centering
\includegraphics[width=\textwidth]{images/intro_dsd.pdf}
@ -192,26 +205,26 @@
\end{center}
\end{frame}
\begin{frame}{Planned Work - SSSM}
\begin{frame}{Current Work - SSSM}
\begin{figure}
\centering
\includegraphics[width=0.9\textwidth]{images/dsd_illustration.pdf}
\end{figure}
\end{frame}
\begin{frame}{Planned Work - SSSM}
\begin{frame}{Current Work - SSSM}
\begin{figure}
\centering
\includegraphics[width=0.9\textwidth]{images/dsd_acc.pdf}
\end{figure}
\end{frame}
\begin{frame}{Planned Work - SSSM}
\begin{frame}{Current Work - SSSM}
\begin{figure}
\centering
\includegraphics[width=0.9\textwidth]{images/preds.pdf}
\end{figure}
\end{frame}
\begin{frame}{Planned Work - SSSM}
\begin{frame}{Current Work - SSSM}
Next Steps:
\begin{itemize}
\item Evaluate performances on a wider range of devices.