<node id="639543">
  <nid>639543</nid>
  <type>event</type>
  <uid>
    <user id="28475"><![CDATA[28475]]></user>
  </uid>
  <created>1600978398</created>
  <changed>1600978398</changed>
  <title><![CDATA[Ph.D. Dissertation Defense - Haider Khan]]></title>
  <body><![CDATA[<p><strong>Title</strong><em>:&nbsp; </em><em>Side-Channel Signal Analysis for Securing Embedded and Cyber-Physical Systems</em></p>

<p><strong>Committee:</strong></p>

<p>Dr. Alenka Zajic, ECE, Chair , Advisor</p>

<p>Dr. Milos Prvulovic, CS, Co-Advisor</p>

<p>Dr. Morris Cohen, ECE</p>

<p>Dr. David Anderson, ECE</p>

<p>Dr. Azadeh Ansari, ECE</p>

<p>Dr. Alessandro Orso, CS</p>

<p><strong>Abstract: </strong>Side-channels cause unintentional information leakage as a side-effect of hardware activity due to legitimate program execution. While attackers have traditionally exploited side-channel analysis for extracting sensitive information from target systems, recent research has utilized side-channels for non-adversarial monitoring of program execution. This approach can be especially useful for securing resource-constrained security-critical embedded systems.&nbsp;This thesis develops methods that leverage electromagnetic (EM) side-channel signals for non-adversarial and non-intrusive monitoring of embedded and cyber-physical systems. Our research provides techniques for identifying anomalous/malicious program behavior by detecting deviations in EM emanations and presents a framework for end-to-end basic-block program execution tracking by monitoring the device&#39;s EM side-channel signal. In this thesis, we 1) designed an intrusion detection system that learns a dictionary of reference EM signatures and exploits the dictionary for identifying anomalous/malicious program behavior, 2) designed neural network to model the monitored device&#39;s EM side-channel signal and detect stealthy malware activities through deviations in EM emanations, 3) designed a novel framework that performs basic-block program execution tracing by monitoring device&#39;s EM side-channel signal, and 4) demonstrated that even a single instruction deviation in program execution can be detected with high accuracy via EM side-channel signals captured by a readily available measurement device.&nbsp;&nbsp;</p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Side-Channel Signal Analysis for Securing Embedded and Cyber-Physical Systems ]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2020-10-05T13:00:00-04:00]]></value>
      <value2><![CDATA[2020-10-05T15:00:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>434381</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[ECE Ph.D. Dissertation Defenses]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>100811</tid>
        <value><![CDATA[Phd Defense]]></value>
      </item>
          <item>
        <tid>1808</tid>
        <value><![CDATA[graduate students]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
