From f103acd54880b032e763669c115455d692e0b2cd Mon Sep 17 00:00:00 2001 From: Arthur Grisel-Davy Date: Mon, 28 Aug 2023 14:13:55 -0400 Subject: [PATCH] add threat model slide --- EET1/MLCS_conference/presentation.tex | 52 +++++++++++++++++++++++++++ 1 file changed, 52 insertions(+) diff --git a/EET1/MLCS_conference/presentation.tex b/EET1/MLCS_conference/presentation.tex index 8173503..c49d17e 100644 --- a/EET1/MLCS_conference/presentation.tex +++ b/EET1/MLCS_conference/presentation.tex @@ -54,6 +54,58 @@ \end{center} \end{frame} +\begin{frame}{Threat Model} + \only<1>{\begin{tcolorbox}[colback=yellow!5!white,colframe=yellow!50!black, + colbacktitle=yellow!75!black,title=Firmware Manipulation] + Change settings, upgrade/downgrade firmware, Replace firmware. + \tcblower + Machine takeover, Advanced Persistent Threats. + \end{tcolorbox} + + \begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white] + Runtime Monitoring + \end{tcolorbox} + \begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white] + Hardware Tampering + \end{tcolorbox} + } + + \only<2>{ + \begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white] + Firmware Manipulation + \end{tcolorbox} + + \begin{tcolorbox}[colback=yellow!5!white,colframe=yellow!50!black, + colbacktitle=yellow!75!black,title=Runtime Monitoring] + Log tampering, login (brute force/dictionary) attacks. + \tcblower + Intrusion, Covert operations. + \end{tcolorbox} + + + \begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white] + Runtim Monitoring + \end{tcolorbox} + } + + \only<3>{ + \begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white] + Firmware Manipulation + \end{tcolorbox} + \begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white] + Runtim Monitoring + \end{tcolorbox} + + \begin{tcolorbox}[colback=yellow!5!white,colframe=yellow!50!black, + colbacktitle=yellow!75!black,title=Hardware Tampering] + Installation/removal of peripherals. + \tcblower + MAC Flooding attacks. + \end{tcolorbox} + } + +\end{frame} + \begin{frame}{Experiment Family I - Firmware Manipulation} \begin{center} \includegraphics[height=0.9\textheight]{images/Firmware_Comparison_TD_direct.pdf}