72 lines
2 KiB
TeX
72 lines
2 KiB
TeX
\documentclass[aspectratio=169,10pt]{beamer}
|
|
\usetheme[progressbar=head,numbering=fraction,sectionpage=none]{metropolis}
|
|
|
|
\usepackage{graphicx}
|
|
\usepackage{ulem}
|
|
\usepackage{xcolor}
|
|
\usepackage[scale=2]{ccicons}
|
|
\usepackage{pgfplots}
|
|
\usepackage{numprint}
|
|
\usepackage{booktabs}
|
|
\usepgfplotslibrary{dateplot}
|
|
\usepackage{hyperref}
|
|
\usepackage{multirow}
|
|
\usepackage{tcolorbox}
|
|
\usepackage{array}
|
|
\usepackage{xspace}
|
|
|
|
\title{Side-channel Based Runtime Intrusion Detection for Network Equipment}
|
|
\subtitle{}
|
|
\date{}
|
|
\author{Arthur Grisel-Davy}
|
|
\institute{University of Waterloo, Canada}
|
|
|
|
\begin{document}
|
|
|
|
\maketitle
|
|
|
|
\begin{frame}{Introduction}
|
|
\begin{center}
|
|
|
|
\end{center}
|
|
\end{frame}
|
|
|
|
\begin{frame}{Common IDS Solution}
|
|
% Figure from the EMSOFT presentation with the different side channels and our solution
|
|
\begin{center}
|
|
\includegraphics[width=\textwidth]{images/main_illustration_1.pdf}
|
|
\end{center}
|
|
\end{frame}
|
|
\begin{frame}{Common IDS Solution}
|
|
% Figure from the EMSOFT presentation with the different side channels and our solution
|
|
\begin{center}
|
|
\includegraphics[width=\textwidth]{images/main_illustration_2.pdf}
|
|
\end{center}
|
|
\end{frame}
|
|
\begin{frame}{Common IDS Solution}
|
|
% Figure from the EMSOFT presentation with the different side channels and our solution
|
|
\begin{center}
|
|
\includegraphics[width=\textwidth]{images/main_illustration_3.pdf}
|
|
\end{center}
|
|
\end{frame}
|
|
\begin{frame}{Common IDS Solution}
|
|
% Figure from the EMSOFT presentation with the different side channels and our solution
|
|
\begin{center}
|
|
\includegraphics[width=\textwidth]{images/main_illustration_4.pdf}
|
|
\end{center}
|
|
\end{frame}
|
|
|
|
\begin{frame}{Experiment Family I - Firmware Manipulation}
|
|
\end{frame}
|
|
\begin{frame}{Experiment Family II - Run-Time Monitoring}
|
|
|
|
\end{frame}
|
|
\begin{frame}{Experiment Family III - Hardware Tampering}
|
|
\begin{center}
|
|
\includegraphics[height=\textheight]{images/switch.jpg}
|
|
\end{center}
|
|
\end{frame}
|
|
|
|
|
|
\end{document}
|
|
|