Mobile Phones as Computing Devices: The Viruses are Coming!
IEEE Pervasive Computing
Quality-Driven Proactive Computation Elimination for Power-Aware Multimedia Processing
Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Impact of paging channel overloads or attacks on a cellular network
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Using Battery Constraints within Mobile Hosts to Improve Network Security
IEEE Security and Privacy
Reconfigurable hardware for high-security/high-performance embedded systems: the SAFES perspective
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Detecting energy-greedy anomalies and mobile malware variants
Proceedings of the 6th international conference on Mobile systems, applications, and services
Context-aware dynamic security configuration for mobile communication device
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
Journal of Systems and Software
Improving sensor network security with information quality
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
SP 800-124. Guidelines on Cell Phone and PDA Security
SP 800-124. Guidelines on Cell Phone and PDA Security
Measurement and modeling of paging channel overloads on a cellular network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Sleep deprivation attacks are a form of denial ofservice attack whereby an attacker renders apervasive computing device inoperable by draining thebattery more quickly than it would be drained undernormal usage. We describe three main methods for anattacker to drain the battery: (1) Service requestpower attacks, where repeated requests are made tothe victim for services, typically over a network--evenif the service is not provided the victim must expendenergy deciding whether or not to honor the request;(2) benign power attacks, where the victim is made toexecute a valid but energy-hungry task repeatedly, and(3) malignant power attacks, where the attackermodifies or creates an executable to make the systemconsume more energy than it would otherwise. Ourinitial results demonstrate the increased powerconsumption due to these attacks, which we believeare the first real examples of these attacks to appear inthe literature. We also propose a power-securearchitecture to thwart these power attacks byemploying multi-level authentication and energysignatures.