Throttling Viruses: Restricting propagation to defeat malicious mobile code
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
SmartSiren: virus detection and alert for smartphones
Proceedings of the 5th international conference on Mobile systems, applications and services
Propagation, detection and containment of mobile malware
Propagation, detection and containment of mobile malware
Designing System-Level Defenses against Cellphone Malware
SRDS '09 Proceedings of the 2009 28th IEEE International Symposium on Reliable Distributed Systems
Rootkits on smart phones: attacks, implications and opportunities
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
SensLoc: sensing everyday places and paths using less energy
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
Hi-index | 0.00 |
This paper proposes to exploit correlation between a user's location and power consumption pattern of his/her smartphone to detect the presence of malicious code in the smartphone. Based on the observation that user location plays an important role in phone usage, the hypothesis is that there is a strong correlation between smartphone power consumption pattern and location. To verify this hypothesis, a detailed study was conducted in which power consumption data from twenty smartphone users was collected over a period of three months. The paper presents this data and a preliminary analysis shows that there is potential for detecting the presence of malicious code in smartphone by detecting abnormalities in location-based power consumption.