Phd Defense by Nader Sehatbakhsh

Event Details
  • Date/Time:
    • Tuesday May 12, 2020
      11:00 am - 1:00 pm
  • Location: REMOTE
  • Phone:
  • URL: BlueJeans Link
  • Email:
  • Fee(s):
    N/A
  • Extras:
Contact
No contact information submitted.
Summaries

Summary Sentence: Leveraging Side-Channel Signals for Security and Trust

Full Summary: No summary paragraph submitted.

Title: Leveraging Side-Channel Signals for Security and Trust

 

Nader Sehatbakhsh

Ph.D. Candidate

School of Computer Science, Georgia Institute of Technology

(http://www.prism.gatech.edu/~nsehatbakhsh3/)

 

Date: May 12th, 2020 (Tuesday)

Time: 11:00 AM - 1:00 PM

Location:  https://bluejeans.com/562982749 

 

Committee:

Dr. Milos Prvulovic (advisor) - School of Computer Science, Georgia Institute of Technology

Dr. Alenka Zajic - School of Electrical and Computer Engineering, Georgia Institute of Technology

Dr. Moin Qureshi - School of Electrical and Computer Engineering, Georgia Institute of Technology

Dr. Hyesoon Kim - School of Computer Science, Georgia Institute of Technology

Dr. Angelos Keromytis - School of Electrical and Computer Engineering, Georgia Institute of Technology

 

Abstract:

This decade has already seen a significant surge in the number of cyber-attacks. With the exponential growth of computers in numbers, due to the rise of cyber-physical systems (CPS) and internet-of-things (IoT) devices, and their ever-increasing importance in controlling critical tasks, it is expected that cybersecurity and data privacy become even more serious problems in the next decade.

To this end, this dissertation presents our methods and findings in designing secure computing systems using two main themes: 1) by discovering, modeling, and mitigating side-channels, and 2) by leveraging side-channels for useful purposes such as debugging and security monitoring. Specifically, in this dissertation, I will first present our novel method on debugging and securing resource-limited devices such as embedded systems, CPSs, and IoTs by externally monitoring these devices using analog side-channels (e.g., electromagnetic emanations, power fluctuations, etc.) that are unintentionally created by these devices. I will describe how analog side-channel signals can be also leveraged for profiling, intrusion detection, and establishing a trusted execution environment (TEE) on resource-constrained devices without incurring any overhead or requiring any hardware-support on the monitored device and/or any intrusion to its functionality. In the second part of this dissertation, I will demonstrate how we can mitigate information leakage vulnerabilities by accurately modeling analog side-channels. I will first present our findings in discovering a new side-channel vulnerability on modern computers. I finally present our approach in designing an open-source microarchitectural simulator that can accurately simulate analog side-channel signals (electromagnetic and power side-channels) in a variety of low-end processors.

 

Additional Information

In Campus Calendar
No
Groups

Graduate Studies

Invited Audience
Faculty/Staff, Public, Graduate students, Undergraduate students
Categories
Other/Miscellaneous
Keywords
Phd Defense
Status
  • Created By: Tatianna Richardson
  • Workflow Status: Published
  • Created On: May 6, 2020 - 1:37pm
  • Last Updated: May 6, 2020 - 1:37pm