2010 43rd Hawaii International Conference on System Sciences 2010
DOI: 10.1109/hicss.2010.170
|View full text |Cite
|
Sign up to set email alerts
|

Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0
2

Year Published

2010
2010
2020
2020

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(32 citation statements)
references
References 6 publications
0
30
0
2
Order By: Relevance
“…Their work shows that attacks were mainly carried out through the MMS/SMS interfaces on the device. In addition, in [11] the authors show that applications can simply overuse the WiFi, Bluetooth or display of the device and eventually cause a denial of service attack. VirusMeter [12] models the power consumption and detects the malware based on power abnormality.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Their work shows that attacks were mainly carried out through the MMS/SMS interfaces on the device. In addition, in [11] the authors show that applications can simply overuse the WiFi, Bluetooth or display of the device and eventually cause a denial of service attack. VirusMeter [12] models the power consumption and detects the malware based on power abnormality.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Their work shows that attacks were mainly carried out through the MMS/SMS interfaces on the device. In addition, in [25] the authors show that applications can simply overuse the WiFi, Bluetooth or display of the device and eventually cause a denial of service attack. VirusMeter [24] models the power consumption and detects the malware based on power abnormality.…”
Section: Related Workmentioning
confidence: 99%
“…Their work shows that attacks were mainly carried out through the MMS/SMS interfaces on the device. In addition, in [18] the authors show that applications can simply overuse the WiFi, Bluetooth or display of the device and eventually cause a denial of service attack. VirusMeter [17] modeled the power consumption and detect the malware based on power abnormality.…”
Section: Related Workmentioning
confidence: 99%