148 lines
3.9 KiB
Typst
148 lines
3.9 KiB
Typst
#import "@preview/polylux:0.3.1": *
|
|
#import themes.metropolis: *
|
|
#import "@preview/tablex:0.0.5": tablex, hlinex, vlinex, colspanx, rowspanx
|
|
|
|
#show: metropolis-theme.with(
|
|
footer: [CC BY-SA 4.0 Arthur Grisel-Davy]
|
|
)
|
|
|
|
#set text(font: "Fira Sans", weight: "light", size: 20pt)
|
|
#show math.equation: set text(font: "Fira Math")
|
|
#set strong(delta: 100)
|
|
#set par(justify: true)
|
|
|
|
#title-slide(
|
|
author: [Arthur Grisel-Davy, Sebastian Fischmeister],
|
|
title: text(size: 30pt, weight: 400)[Independent Boot Process Verification using Side-Channel Power Analysis],
|
|
subtitle: "",
|
|
date: "University of Waterloo",
|
|
extra: "agriseld@uwaterloo.ca"
|
|
)
|
|
|
|
#slide(title: "Introduction")[
|
|
#only(1)[#image("images/wein_p1.svg", width: 100%)]
|
|
#only(2)[#image("images/wein_p2.svg", width: 100%)]
|
|
]
|
|
|
|
#slide(title: "Overview")[
|
|
#image("images/illustration.svg", width: 100%)
|
|
]
|
|
|
|
#slide(title: "Capture System")[
|
|
#align(center)[
|
|
#image("images/setup.svg", width: 80%)
|
|
]
|
|
]
|
|
|
|
#slide(title: "BPV Model")[
|
|
#align(center)[
|
|
#image("images/training_unique_p1.svg", height: 100%)
|
|
]
|
|
]
|
|
|
|
#slide(title: "Multi-Model Support")[
|
|
#align(center)[
|
|
#only(1)[#image("images/training_unique_p2.svg", height: 100%)]
|
|
#only(2)[#image("images/training_unique_p3.svg", height: 100%)]
|
|
]
|
|
]
|
|
|
|
|
|
#focus-slide()[
|
|
Test Cases
|
|
]
|
|
|
|
#slide(title: "Test Case 1 - Networking Devices")[
|
|
#figure(
|
|
placement: auto,
|
|
tablex(
|
|
columns: (25%,25%,25%,25%),
|
|
align: (left+horizon,right+horizon,right+horizon,right+horizon),
|
|
auto-vlines: false,
|
|
repeat-header: false,
|
|
[*Device*], [*Original*], [*Change 1*], [*Change 2*],
|
|
[TP-Link\ Switch], [20200805], [20200109], [X],
|
|
[HP Procurve\ Switch], [H.10.119], [H.10.117], [X],
|
|
[Asus Router], [Latest EOM], [OpenWrt\ v21.02.2], [OpenWrt\ v21.02.0],
|
|
[Linksys\ Router], [Latest EOM], [OpenWrt\ v21.02.2], [OpenWrt\ v21.02.0],
|
|
),
|
|
supplement: [Table],
|
|
kind: "table",
|
|
caption: [Machines used for the experiment and the changes applied.],
|
|
)<tab-machines>
|
|
]
|
|
|
|
#slide(title: "Test Case 1 - Results")[
|
|
#figure(
|
|
placement: auto,
|
|
tablex(
|
|
columns: (30%,30%),
|
|
auto-vlines: false,
|
|
align: (left, right),
|
|
[*Machine*], [*$F_1$ Score*],
|
|
[TP-Link switch], [0.87],
|
|
[HP switch], [0.98],
|
|
[Asus router], [1.00],
|
|
[Linksys router], [0.92]
|
|
),
|
|
supplement: [Table],
|
|
kind: "table",
|
|
caption: [Results of the detection of anomalous firmwares on networking devices.]
|
|
)<tab-results>
|
|
]
|
|
|
|
|
|
#slide(title: "Test Case 2 - Drone")[
|
|
Five Scenarios:
|
|
|
|
- *x2 Nominal*: Before and after modifications.
|
|
- *Low Battery*: Supplied voltage below 11V
|
|
- *x2 Malfunctioning Firmware*: Bugs in bootloader and battery module.
|
|
]
|
|
|
|
#slide(title: "Test Case 2 - Results")[
|
|
#figure(
|
|
tablex(
|
|
auto-vlines: false,
|
|
align: (left, right, right),
|
|
columns: (30%,20%,30%),
|
|
[*Scenario*],[*Accuracy*], [*Nbr. of Samples*],
|
|
[Original],[1],[98],
|
|
[Compiled],[1],[49],
|
|
[Low Battery],[1],[44],
|
|
[Bootloader Bug],[1],[50],
|
|
[Battery Module Bug], [0.082],[39],
|
|
),
|
|
supplement: [Table],
|
|
kind: "table",
|
|
caption: [Results of the intrusion detection on the drone.]
|
|
)<drone-results>
|
|
]
|
|
|
|
// if no results, present the setup and say why this is interesting and versatile
|
|
#slide(title: "Test Case 3 - General Purpose Computer")[
|
|
#image("images/l3-setup.svg", width: 100%)
|
|
]
|
|
|
|
#slide(title: "Test Case 3 - Results")[
|
|
Known attack (boot on external device) #sym.arrow Optimised threshold #sym.arrow $F_1$ Score: #text(weight: "bold")[100%]
|
|
]
|
|
|
|
#slide(title: "Anomaly Infused Model (AIM)")[
|
|
#align(center)[
|
|
#only(1)[#image("images/aim_p1.svg", height:120%)]
|
|
#only(2)[#image("images/aim_p2.svg", height:120%)]
|
|
]
|
|
]
|
|
|
|
#slide(title: "Future Work")[
|
|
- Improve automatic computation of optimal threshold (anomaly generation)
|
|
- Evaluate performances with a wider variety of attacks.
|
|
]
|
|
|
|
|
|
#focus-slide()[
|
|
Thank you for your attention!
|
|
|
|
#text(size: 20pt)[Contact: #text(weight: "bold")[agriseld\@uwaterloo.ca]]
|
|
]
|