add threat model slide
This commit is contained in:
parent
a2e4bb6b6e
commit
f103acd548
1 changed files with 52 additions and 0 deletions
|
|
@ -54,6 +54,58 @@
|
||||||
\end{center}
|
\end{center}
|
||||||
\end{frame}
|
\end{frame}
|
||||||
|
|
||||||
|
\begin{frame}{Threat Model}
|
||||||
|
\only<1>{\begin{tcolorbox}[colback=yellow!5!white,colframe=yellow!50!black,
|
||||||
|
colbacktitle=yellow!75!black,title=Firmware Manipulation]
|
||||||
|
Change settings, upgrade/downgrade firmware, Replace firmware.
|
||||||
|
\tcblower
|
||||||
|
Machine takeover, Advanced Persistent Threats.
|
||||||
|
\end{tcolorbox}
|
||||||
|
|
||||||
|
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
||||||
|
Runtime Monitoring
|
||||||
|
\end{tcolorbox}
|
||||||
|
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
||||||
|
Hardware Tampering
|
||||||
|
\end{tcolorbox}
|
||||||
|
}
|
||||||
|
|
||||||
|
\only<2>{
|
||||||
|
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
||||||
|
Firmware Manipulation
|
||||||
|
\end{tcolorbox}
|
||||||
|
|
||||||
|
\begin{tcolorbox}[colback=yellow!5!white,colframe=yellow!50!black,
|
||||||
|
colbacktitle=yellow!75!black,title=Runtime Monitoring]
|
||||||
|
Log tampering, login (brute force/dictionary) attacks.
|
||||||
|
\tcblower
|
||||||
|
Intrusion, Covert operations.
|
||||||
|
\end{tcolorbox}
|
||||||
|
|
||||||
|
|
||||||
|
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
||||||
|
Runtim Monitoring
|
||||||
|
\end{tcolorbox}
|
||||||
|
}
|
||||||
|
|
||||||
|
\only<3>{
|
||||||
|
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
||||||
|
Firmware Manipulation
|
||||||
|
\end{tcolorbox}
|
||||||
|
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
||||||
|
Runtim Monitoring
|
||||||
|
\end{tcolorbox}
|
||||||
|
|
||||||
|
\begin{tcolorbox}[colback=yellow!5!white,colframe=yellow!50!black,
|
||||||
|
colbacktitle=yellow!75!black,title=Hardware Tampering]
|
||||||
|
Installation/removal of peripherals.
|
||||||
|
\tcblower
|
||||||
|
MAC Flooding attacks.
|
||||||
|
\end{tcolorbox}
|
||||||
|
}
|
||||||
|
|
||||||
|
\end{frame}
|
||||||
|
|
||||||
\begin{frame}{Experiment Family I - Firmware Manipulation}
|
\begin{frame}{Experiment Family I - Firmware Manipulation}
|
||||||
\begin{center}
|
\begin{center}
|
||||||
\includegraphics[height=0.9\textheight]{images/Firmware_Comparison_TD_direct.pdf}
|
\includegraphics[height=0.9\textheight]{images/Firmware_Comparison_TD_direct.pdf}
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue