start biblio in yml
This commit is contained in:
parent
b563390356
commit
f472cb0ea6
2 changed files with 26 additions and 5 deletions
14
scolarship_CPI/biblio.yml
Normal file
14
scolarship_CPI/biblio.yml
Normal file
|
|
@ -0,0 +1,14 @@
|
|||
bpv:
|
||||
type: Article
|
||||
title: Independent Boot Process Verification using Side-Channel Power Analysis
|
||||
author:
|
||||
- Grisel-Davy, Arthur
|
||||
- Fischmeister, Sebastian
|
||||
date: 2023-10-22
|
||||
parent:
|
||||
- type: Conference
|
||||
title:
|
||||
value: IEEE International Conference on Software Quality, Reliability and Security
|
||||
short: QRS 2023
|
||||
location: Chiang Mai, Thailand
|
||||
|
||||
|
|
@ -9,19 +9,23 @@
|
|||
#set page("us-letter")
|
||||
|
||||
|
||||
I am recommending Arthur Grisel-Davy for the Cybersecurity and Privacy Excellence Graduate Scholarships.
|
||||
I have supervised Arthur first in 2019 when he was a visiting student discovering the world of research, and then again since 2021 in his doctoral studies.
|
||||
|
||||
The first project he took part in explored the potential of side-channel analysis for defensive applications on embedded systems.
|
||||
|
||||
I am recommending Arthur Grisel-Davy for the Cybersecurity and Privacy Excellence Graduate Scholarships.
|
||||
|
||||
I have supervised Arthur first in 2019 when he was a visiting student discovering the world of research, and then again since 2021 and until now during his doctoral studies.
|
||||
Building on all the previous projects he was involved in, he decided to dedicate his studies to the use of side channel information for intrusion detection and he is now a third year Ph.D. candidate.
|
||||
|
||||
The first project Arthur took part in explored the potential of side-channel analysis for defensive applications on embedded systems.
|
||||
This work led to the publication of a paper in ...
|
||||
The results from this first project highlighted several axis for future work on bootup verification, runtime analysis and log verification.
|
||||
Arthur dedicated his Ph.D. to this topic and eventually explored all these branches of phycis-based defense.
|
||||
|
||||
After the exploration phase, Arthur worked on bootup verification.
|
||||
He proposed an approach for the problem of assessing the integrity of a machine using only a few known-good examples of bootup traces.
|
||||
This approach led to two publications: first a work-in-progress paper in ... and then an aticle presented in ... that present the approach in more details and use-cases.
|
||||
This approach led to two publications: first a work-in-progress paper in ... and then an aticle presented in @bpv that present the approach in more details and use-cases.
|
||||
For each of these articles, Arthur was the main author and had to write all the publications, integrate reviewers comments, and travel to the conferences to present his work.
|
||||
These were his first experiences with the presentation of researhc work.
|
||||
These were his first experiences with the presentation of researhc work.
|
||||
|
||||
The second axis of research that Arthur explored was the runtime verification ofembedded systems.
|
||||
With the goal to bridge the gap between raw side-channel information and rule-based intrusion detection systems, Arthur developped a few-shot pattern-recognition algorithm for univariate time series.
|
||||
|
|
@ -44,3 +48,6 @@ His commitment to advancing the field of cybersecurity and privacy is evident in
|
|||
Arthur is a person of integrity, professionalism, and a collaborative spirit, making him a valuable member of our academic community.
|
||||
|
||||
I believe that Arthur Grisel-Davy would be a deserving recipient of this scolarship.
|
||||
|
||||
|
||||
#bibliography("biblio.yml")
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue