Electromagnetic radiation from video display units: an eavesdropping risk?
Computers and Security
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Panorama: capturing system-wide information flow for malware detection and analysis
Proceedings of the 14th ACM conference on Computer and communications security
Detecting energy-greedy anomalies and mobile malware variants
Proceedings of the 6th international conference on Mobile systems, applications, and services
VirusMeter: Preventing Your Cellphone from Spies
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
Information Security Applications
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Compromising electromagnetic emanations of wired and wireless keyboards
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
LIBSVM: A library for support vector machines
ACM Transactions on Intelligent Systems and Technology (TIST)
Dark silicon and the end of multicore scaling
Proceedings of the 38th annual international symposium on Computer architecture
Televisions, video privacy, and powerline electromagnetic interference
Proceedings of the 18th ACM conference on Computer and communications security
Implications of Historical Trends in the Electrical Efficiency of Computing
IEEE Annals of the History of Computing
Electromagnetic eavesdropping risks of flat-panel displays
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Hi-index | 0.00 |
The trend toward energy-proportional computing, in which power consumption scales closely with workload, is making computers increasingly vulnerable to information leakage via whole-system power analysis. Saving energy is an unqualified boon for computer operators, but this trend has produced an unintentional side effect: it is becoming easier to identify computing activities in power traces because idle-power reduction has lowered the effective noise floor. This paper offers preliminary evidence that the analysis of AC power traces can be both harmful to privacy and beneficial for malware detection, the latter of which may benefit embedded (e.g., medical) devices.