\documentclass[aspectratio=169,10pt]{beamer} \usetheme[progressbar=head,numbering=fraction,sectionpage=none]{metropolis} \usepackage{graphicx} \usepackage{ulem} \usepackage{xcolor} \usepackage[scale=2]{ccicons} \usepackage{pgfplots} \usepackage{numprint} \usepackage{booktabs} \usepgfplotslibrary{dateplot} \usepackage{hyperref} \usepackage{multirow} \usepackage{tcolorbox} \usepackage{array} \usepackage{xspace} \title{Side-channel Based Runtime Intrusion Detection for Network Equipment} \subtitle{} \date{} \author{Arthur Grisel-Davy} \institute{University of Waterloo, Canada} \begin{document} \maketitle \begin{frame}{Introduction} \begin{center} \end{center} \end{frame} \begin{frame}{Common IDS Solution} \begin{center} \includegraphics[width=\textwidth]{images/main_illustration_1.pdf} \end{center} \end{frame} \begin{frame}{Common IDS Solution} \begin{center} \includegraphics[width=\textwidth]{images/main_illustration_2.pdf} \end{center} \end{frame} \begin{frame}{Common IDS Solution} \begin{center} \includegraphics[width=\textwidth]{images/main_illustration_3.pdf} \end{center} \end{frame} \begin{frame}{Common IDS Solution} \begin{center} \includegraphics[width=\textwidth]{images/main_illustration_4.pdf} \end{center} \end{frame} \begin{frame}{Experiment Family I - Firmware Manipulation} \begin{center} \includegraphics[height=0.9\textheight]{images/Firmware_Comparison_TD_direct.pdf} \end{center} \end{frame} \begin{frame}{Experiment Family II - Run-Time Monitoring} \begin{center} \includegraphics[height=0.9\textheight]{images/time_domain_ssh.pdf} \end{center} \end{frame} \begin{frame}{Experiment Family III - Hardware Tampering} \begin{center} \includegraphics[height=\textheight]{images/switch.jpg} \end{center} \end{frame} \end{document}