Show simple item record

dc.contributor.authorSehatbakhsh, Nader
dc.date.accessioned2019-11-19T20:31:44Z
dc.date.available2019-11-19T20:31:44Z
dc.date.issued2019-11-08
dc.identifier.urihttp://hdl.handle.net/1853/62038
dc.descriptionPresented on November 8, 2019 at 12:00 p.m. in the Krone Engineered Biosystems Building, Room 1005.en_US
dc.descriptionNader Sehatbakhsh is a Ph.D. student in the School of Computer Science, Georgia Institute of Technology. His research interest is on the broad area of Security and Privacy with emphasis on computer architecture and hardware security, side-channels, hardware-support for security and privacy, and embedded system security.en_US
dc.descriptionRuntime: 59:41 minutesen_US
dc.description.abstractWith the proliferation of computing systems in our world, from servers to internet-of-things devices, side-channel signals have become significantly more available and accessible to measure and leverage. This availability provides both opportunities and security threats. On one hand, these side-channels may “leak” sensitive information about the system, and if exploited by an adversary, it would pose security threats to the system. On the other hand, however, these signals can be leveraged as extra sources of information which can be used for benign and useful purposes such as debugging/profiling, malware/intrusion detection, and security monitoring. Given these opportunities and threats, understanding how these side-channels are created and developing frameworks to leverage them is an important topic. To address these challenges, in this talk, I will describe our new methods and frameworks to identify, quantify, and leverage side-channel signals particularly analog-domain electromagnetic (EM) emanations, and then describe how these analog-domain side-channels can be leveraged for intrusion detection on a variety of embedded and cyber-physical systems. Moreover, I will present our recent work on how side-channels can be leveraged to create a trusted execution environment (TEE) on a resource-constrained device (e.g., an Internet-of-Things device).en_US
dc.format.extent59:41 minutes
dc.language.isoen_USen_US
dc.publisherGeorgia Institute of Technologyen_US
dc.relation.ispartofseriesCybersecurity Lecture Seriesen_US
dc.subjectAnalog-domain electromagnetic emanationsen_US
dc.subjectSide-channel signalsen_US
dc.subjectTrusten_US
dc.titleLeveraging Side-Channel Signals for Security and Trusten_US
dc.typeLectureen_US
dc.typeVideoen_US
dc.contributor.corporatenameGeorgia Institute of Technology. Institute for Information Security & Privacyen_US
dc.contributor.corporatenameGeorgia Institute of Technology. School of Computer Scienceen_US


Files in this item

Thumbnail
Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record