This paper investigates the feasibility of constructing power-consumption-based sensors for the identification of security threats (e.g. battery-drain attacks) on Android based mobile devices. In particular, this paper proposes a measurement methodology and high-level models for the energy consumption of two very important hardware subsystems in a mobile device, namely the Wi-Fi and the CPU. The measuring methodology and the high-level models are then compared to others described in the literature and validated through actual experiments. Finally, the proposed methodology is tested with an energy oriented variant of the ping-flood attack performed while a legitimate application is running. Experimental results show that the measurement meth...
Energy consumption caused by wireless data transmission on smart phones is increasing rapidly with t...
Abstract—This paper introduces a supporting model for a unique Battery-Sensing Intrusion Protection ...
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SI...
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaust...
The increasing adoption of mobile devices as the preferred tool to access the Internet imposes to de...
Abstract—Smartphones and related mobile end-user devices rep-resent key components of mobile computi...
In order to solve the problem that Android platform’s sand-box mechanism prevents security protectio...
An Internet of Things (IoT) architecture generally consists of a wide range of Internet-connected de...
In just forty years, the number of mobile devices has exceeded the number of humans on Earth. With t...
In recent years there has been a growing number of viruses, rootkits, and malware designed to gain a...
Abstract—This paper describes a unique Battery-Sensing Intrusion Protection System (B-SIPS) for mobi...
Mobile users of computation and communication services have been rapidly adopting battery-powered mo...
Many security problems in smartphones and other smart devices are ap-proached from an anomaly detect...
Mobile devices are constantly becoming more power hungry. At the same time the battery capacities ar...
Abstract—Modern mobile phones are an appealing platform for pervasive computing applications. Howeve...
Energy consumption caused by wireless data transmission on smart phones is increasing rapidly with t...
Abstract—This paper introduces a supporting model for a unique Battery-Sensing Intrusion Protection ...
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SI...
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaust...
The increasing adoption of mobile devices as the preferred tool to access the Internet imposes to de...
Abstract—Smartphones and related mobile end-user devices rep-resent key components of mobile computi...
In order to solve the problem that Android platform’s sand-box mechanism prevents security protectio...
An Internet of Things (IoT) architecture generally consists of a wide range of Internet-connected de...
In just forty years, the number of mobile devices has exceeded the number of humans on Earth. With t...
In recent years there has been a growing number of viruses, rootkits, and malware designed to gain a...
Abstract—This paper describes a unique Battery-Sensing Intrusion Protection System (B-SIPS) for mobi...
Mobile users of computation and communication services have been rapidly adopting battery-powered mo...
Many security problems in smartphones and other smart devices are ap-proached from an anomaly detect...
Mobile devices are constantly becoming more power hungry. At the same time the battery capacities ar...
Abstract—Modern mobile phones are an appealing platform for pervasive computing applications. Howeve...
Energy consumption caused by wireless data transmission on smart phones is increasing rapidly with t...
Abstract—This paper introduces a supporting model for a unique Battery-Sensing Intrusion Protection ...
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SI...