59 lines
1.4 KiB
Typst
59 lines
1.4 KiB
Typst
#import "@preview/polylux:0.3.1": *
|
|
#import themes.metropolis: *
|
|
|
|
#show: metropolis-theme.with(
|
|
footer: [CC BY-NC-SA]
|
|
)
|
|
|
|
#set text(font: "STIX Two Text", weight: "light", size: 20pt)
|
|
#show math.equation: set text(font: "STIX Two Text")
|
|
#set strong(delta: 100)
|
|
#set par(justify: true)
|
|
|
|
#title-slide(
|
|
author: [Arthur Grisel-Davy],
|
|
title: "Seminar: Process-Power Consistency as Sanity Check",
|
|
subtitle: "Subtitle",
|
|
date: "September 2024",
|
|
extra: ""
|
|
)
|
|
|
|
#slide(title: "State of the IDS")[
|
|
// Most IDS rely on host-based information
|
|
// Process List is a very common default info to verify
|
|
// Process masquerading is trivialy posible and used by many attacks (Mitre AttCK list)
|
|
// Countermeasure to process masquerading
|
|
]
|
|
|
|
#slide(title:"Process List Verification")[
|
|
// We can't stop using the process list, so let's try to verify it
|
|
// Power as a trusted source of information
|
|
]
|
|
|
|
#slide(title:"Power Side-Channel")[
|
|
// Why is power trusted
|
|
// Why is it correlated with the process list
|
|
// Why is it the best/most practical side-channel
|
|
]
|
|
|
|
#slide(title:"Experimental Setup")[
|
|
// Setup of the experiment
|
|
// What data to gather
|
|
// Log data
|
|
// Power data (comparison hardware/software)
|
|
// Resulting dataset
|
|
]
|
|
|
|
#slide(title:"Problem Statement")[
|
|
]
|
|
|
|
#slide(title:"Proposed Approach")[
|
|
// Proposed approach
|
|
//
|
|
]
|
|
|
|
#slide(title:"Evaluation")[
|
|
]
|
|
|
|
#slide(title:"Future Developements")[
|
|
]
|