{"635118":{"#nid":"635118","#data":{"type":"event","title":"Phd Defense by Nader Sehatbakhsh","body":[{"value":"\u003Cp\u003E\u003Cstrong\u003ETitle:\u0026nbsp;\u003C\/strong\u003ELeveraging Side-Channel Signals for Security and Trust\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ENader Sehatbakhsh\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003EPh.D. Candidate\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESchool\u0026nbsp;of\u0026nbsp;Computer Science, Georgia Institute\u0026nbsp;of\u0026nbsp;Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003E(\u003Ca href=\u0022http:\/\/www.prism.gatech.edu\/~nsehatbakhsh3\/\u0022\u003Ehttp:\/\/www.prism.gatech.edu\/~nsehatbakhsh3\/\u003C\/a\u003E)\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EDate:\u0026nbsp;\u003C\/strong\u003EMay 12th, 2020 (Tuesday)\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ETime:\u0026nbsp;\u003C\/strong\u003E11:00 AM - 1:00 PM\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ELocation: \u0026nbsp;\u003Ca href=\u0022https:\/\/bluejeans.com\/562982749\u0022\u003Ehttps:\/\/bluejeans.com\/562982749\u003C\/a\u003E\u003C\/strong\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ECommittee:\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Milos Prvulovic (advisor) - School\u0026nbsp;of\u0026nbsp;Computer Science, Georgia Institute\u0026nbsp;of\u0026nbsp;Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Alenka Zajic - School\u0026nbsp;of\u0026nbsp;Electrical and\u0026nbsp;Computer Engineering, Georgia Institute\u0026nbsp;of\u0026nbsp;Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Moin Qureshi - School\u0026nbsp;of\u0026nbsp;Electrical and\u0026nbsp;Computer Engineering, Georgia Institute\u0026nbsp;of\u0026nbsp;Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Hyesoon Kim - School\u0026nbsp;of\u0026nbsp;Computer Science, Georgia Institute\u0026nbsp;of\u0026nbsp;Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Angelos Keromytis - School\u0026nbsp;of\u0026nbsp;Electrical and\u0026nbsp;Computer Engineering, Georgia Institute\u0026nbsp;of\u0026nbsp;Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EAbstract:\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThis decade has already seen a significant surge in the number of cyber-attacks. With the exponential\u0026nbsp;growth of computers in numbers, due to the rise of cyber-physical systems (CPS) and internet-of-things\u0026nbsp;(IoT) devices, and their ever-increasing importance in controlling critical tasks, it is expected that\u0026nbsp;cybersecurity and data privacy become even more serious problems in the next decade.\u003C\/p\u003E\r\n\r\n\u003Cp\u003ETo this end, this dissertation presents our methods and findings in designing secure computing systems\u0026nbsp;using two main themes: 1) by discovering, modeling, and mitigating side-channels, and 2) by leveraging\u0026nbsp;side-channels for useful purposes such as debugging and security monitoring. Specifically, in this\u0026nbsp;dissertation, I will first present our novel method on debugging and securing resource-limited devices such\u0026nbsp;as embedded systems, CPSs, and IoTs by externally monitoring these devices using analog side-channels\u0026nbsp;(e.g., electromagnetic emanations, power fluctuations, etc.) that are unintentionally created by these\u0026nbsp;devices. I will describe how analog side-channel signals can be also leveraged for profiling, intrusion\u0026nbsp;detection, and establishing a trusted execution environment (TEE) on resource-constrained devices without\u0026nbsp;incurring any overhead or requiring any hardware-support on the monitored device and\/or any intrusion to\u0026nbsp;its functionality. In the second part of this dissertation, I will demonstrate how we can mitigate information\u0026nbsp;leakage vulnerabilities by accurately modeling analog side-channels. I will first present our findings in\u0026nbsp;discovering a new side-channel vulnerability on modern computers. I finally present our approach in\u0026nbsp;designing an open-source microarchitectural simulator that can accurately simulate analog side-channel\u0026nbsp;signals (electromagnetic and power side-channels) in a variety of low-end processors.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Leveraging Side-Channel Signals for Security and Trust"}],"uid":"27707","created_gmt":"2020-05-06 17:37:48","changed_gmt":"2020-05-06 17:37:48","author":"Tatianna Richardson","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2020-05-12T12:00:00-04:00","event_time_end":"2020-05-12T14:00:00-04:00","event_time_end_last":"2020-05-12T14:00:00-04:00","gmt_time_start":"2020-05-12 16:00:00","gmt_time_end":"2020-05-12 18:00:00","gmt_time_end_last":"2020-05-12 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"groups":[{"id":"221981","name":"Graduate Studies"}],"categories":[],"keywords":[{"id":"100811","name":"Phd Defense"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}