Communications of the ACM
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Denial-of-Service Attacks on Battery-powered Mobile Computers
PERCOM '04 Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04)
Automated response using system-call delays
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Using Battery Constraints within Mobile Hosts to Improve Network Security
IEEE Security and Privacy
Reconfigurable hardware for high-security/high-performance embedded systems: the SAFES perspective
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Fine-grained I/O access control of the mobile devices based on the Xen architecture
Proceedings of the 15th annual international conference on Mobile computing and networking
Context-aware dynamic security configuration for mobile communication device
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
Journal of Systems and Software
Static analysis of executables for collaborative malware detection on android
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Homogeneity analysis of power consumption for information security purposes
Proceedings of the 3rd international conference on Security of information and networks
Exploiting smart-phone USB connectivity for fun and profit
Proceedings of the 26th Annual Computer Security Applications Conference
DoS attacks exploiting signaling in UMTS and IMS
Computer Communications
A framework for defending embedded systems against software attacks
ACM Transactions on Embedded Computing Systems (TECS)
Andbot: towards advanced mobile botnets
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
"Andromaly": a behavioral malware detection framework for android devices
Journal of Intelligent Information Systems
Exposing security risks for commercial mobile devices
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Lightweight energy consumption based intrusion detection system for wireless sensor networks
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Hi-index | 0.00 |
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the device. In this paper we present our first steps in the design of an intrusion detection system for these attacks, a system that takes into account the performance, energy, and memory constraints of mobile computing devices. This intrusion detection system uses several parameters, such as CPU load and disk accesses, to estimate the power consumption using a linear regression model, allowing us to find the energy used on a per process basis, and thus identifying processes that are potentially battery exhaustion attacks.