add threat model slide
This commit is contained in:
parent
a2e4bb6b6e
commit
f103acd548
1 changed files with 52 additions and 0 deletions
|
|
@ -54,6 +54,58 @@
|
|||
\end{center}
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}{Threat Model}
|
||||
\only<1>{\begin{tcolorbox}[colback=yellow!5!white,colframe=yellow!50!black,
|
||||
colbacktitle=yellow!75!black,title=Firmware Manipulation]
|
||||
Change settings, upgrade/downgrade firmware, Replace firmware.
|
||||
\tcblower
|
||||
Machine takeover, Advanced Persistent Threats.
|
||||
\end{tcolorbox}
|
||||
|
||||
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
||||
Runtime Monitoring
|
||||
\end{tcolorbox}
|
||||
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
||||
Hardware Tampering
|
||||
\end{tcolorbox}
|
||||
}
|
||||
|
||||
\only<2>{
|
||||
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
||||
Firmware Manipulation
|
||||
\end{tcolorbox}
|
||||
|
||||
\begin{tcolorbox}[colback=yellow!5!white,colframe=yellow!50!black,
|
||||
colbacktitle=yellow!75!black,title=Runtime Monitoring]
|
||||
Log tampering, login (brute force/dictionary) attacks.
|
||||
\tcblower
|
||||
Intrusion, Covert operations.
|
||||
\end{tcolorbox}
|
||||
|
||||
|
||||
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
||||
Runtim Monitoring
|
||||
\end{tcolorbox}
|
||||
}
|
||||
|
||||
\only<3>{
|
||||
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
||||
Firmware Manipulation
|
||||
\end{tcolorbox}
|
||||
\begin{tcolorbox}[colback=yellow!75!black,colframe=yellow!50!black, coltext=white]
|
||||
Runtim Monitoring
|
||||
\end{tcolorbox}
|
||||
|
||||
\begin{tcolorbox}[colback=yellow!5!white,colframe=yellow!50!black,
|
||||
colbacktitle=yellow!75!black,title=Hardware Tampering]
|
||||
Installation/removal of peripherals.
|
||||
\tcblower
|
||||
MAC Flooding attacks.
|
||||
\end{tcolorbox}
|
||||
}
|
||||
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}{Experiment Family I - Firmware Manipulation}
|
||||
\begin{center}
|
||||
\includegraphics[height=0.9\textheight]{images/Firmware_Comparison_TD_direct.pdf}
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue