split and expand letter

This commit is contained in:
Arthur 2024-05-25 18:05:41 -04:00
parent a646417d58
commit b563390356
2 changed files with 46 additions and 17 deletions

46
scolarship_CPI/letter.typ Normal file
View file

@ -0,0 +1,46 @@
#import "@preview/acrostiche:0.3.0": *
#init-acronyms((
"IDS": ("Intrusion Detection System"),
"BPV": ("Boot Process Verification"),
))
#set page("us-letter")
I am recommending Arthur Grisel-Davy for the Cybersecurity and Privacy Excellence Graduate Scholarships.
I have supervised Arthur first in 2019 when he was a visiting student discovering the world of research, and then again since 2021 in his doctoral studies.
The first project he took part in explored the potential of side-channel analysis for defensive applications on embedded systems.
This work led to the publication of a paper in ...
The results from this first project highlighted several axis for future work on bootup verification, runtime analysis and log verification.
Arthur dedicated his Ph.D. to this topic and eventually explored all these branches of phycis-based defense.
After the exploration phase, Arthur worked on bootup verification.
He proposed an approach for the problem of assessing the integrity of a machine using only a few known-good examples of bootup traces.
This approach led to two publications: first a work-in-progress paper in ... and then an aticle presented in ... that present the approach in more details and use-cases.
For each of these articles, Arthur was the main author and had to write all the publications, integrate reviewers comments, and travel to the conferences to present his work.
These were his first experiences with the presentation of researhc work.
The second axis of research that Arthur explored was the runtime verification ofembedded systems.
With the goal to bridge the gap between raw side-channel information and rule-based intrusion detection systems, Arthur developped a few-shot pattern-recognition algorithm for univariate time series.
His work was published at ... and received the best paper awart for this edition.
Arthur's current project aims at verifying the logs emmited by a machine using the power consumption, providing more trust to the log for later evaluation.
Along his studies, Arthur also undertook the role of advisor for younger students.
He shares his experience of conducting experiments and writing articles with a few students each term.
This role led to multiple collaborations on topics like the study of power consumption patterns from battery-powered devices or pattern mining algorithms.
Other collaborations natturally spawend with other students, for example on the topic of system's trust management.
Arthur also took the opportunity of his Ph.D. studies to learn new topics for personnal research projects.
He proposed to learn PCB design to build a new power trace capture system for USB-C charging cables.
He also reached out to other labs to explore his idea of using power cables as bi-directional covert channels.
Arthur has consistently demonstrated dedication, creativity, and scholarly achievement throughout his studies in our research group.
His commitment to advancing the field of cybersecurity and privacy is evident in his motivation, ideas, accomplishments, and publications in reputable conferences.
Arthur is a person of integrity, professionalism, and a collaborative spirit, making him a valuable member of our academic community.
I believe that Arthur Grisel-Davy would be a deserving recipient of this scolarship.

View file

@ -36,20 +36,3 @@ The boot sequence of a machine is a critical state for the machine security.
The bootloader and firmware that executes during this sequence controles the lowest level of software that sets important security parameter. The bootloader and firmware that executes during this sequence controles the lowest level of software that sets important security parameter.
Moreover, this is a particularily vulnerable sequence as no host-based #acr("IDS") is running. Moreover, this is a particularily vulnerable sequence as no host-based #acr("IDS") is running.
There are hardware-based mechanisms, often leveraging cryptographic sugnatures, that strive to prevent firmware tampering, but studies illustrated the possibility to bypass them #cn. There are hardware-based mechanisms, often leveraging cryptographic sugnatures, that strive to prevent firmware tampering, but studies illustrated the possibility to bypass them #cn.
#pagebreak()
I am recommending Arthur Grisel-Davy for the Cybersecurity and Privacy Excellence Graduate Scholarships.
I have supervised Arthur first in 2019 when he was a visiting student discovering the world of research, and then again since 2021 in his doctoral studies.
I have seen Arthur learn the ... of academic research by always learning how to overcom challenges and striving to become a better scientist.
Arthur has consistently demonstrated dedication, creativity, and scholarly achievement throughout his studies in our research group.
His commitment to advancing the field of cybersecurity and privacy is evident in his motivation, ideas, accomplishments, and publications in reputable journals.
Along his studies, Arthur also undertook the role of advisor for younger students.
He shares his experience of conducting experiments and writing articles with a few students each term.
Arthur is a person of integrity, professionalism, and a collaborative spirit, making him a valuable member of our academic community.
His willingness to mentor other students further demonstrates his commitment to academic excellence and community engagement.
I believe that Arthur Grisel-Davy would be a deserving recipient of this scolarship.