Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008) 2008
DOI: 10.1109/hicss.2008.319
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Device Profiling and Intrusion Detection Using Smart Batteries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 67 publications
(24 citation statements)
references
References 8 publications
0
24
0
Order By: Relevance
“…K. Buennemeyer et al [3], in their work introduce capabilities developed for Battery -Sensing Intrusion protection system (B-SIPS) that raises an alert when an abnormal current change occurs. They have developed a Correlation Intrusion Detection Engine (CIDE) that provides power profiling for mobile devices and a correlated view of B-SIPS and Snort alerts.…”
Section: Recent Workmentioning
confidence: 99%
“…K. Buennemeyer et al [3], in their work introduce capabilities developed for Battery -Sensing Intrusion protection system (B-SIPS) that raises an alert when an abnormal current change occurs. They have developed a Correlation Intrusion Detection Engine (CIDE) that provides power profiling for mobile devices and a correlated view of B-SIPS and Snort alerts.…”
Section: Recent Workmentioning
confidence: 99%
“…There exist several attempts to detect mobile malware by monitoring the power consumption patterns of applications [26][27][28]. For example, if our backdoor application consumes an excessive amount of battery power deviated from typical power usage, this would make our backdoor detected easily by antimalware systems based on power consumption monitoring.…”
Section: Power Consumptionmentioning
confidence: 99%
“…Concretely, in June of the same year, the first malware specially written for Symbian OS platform was discovered [15]. After the infection success carried out by Cabir malware and its variants [19], researchers proposed approaches and Due to the lack of smartphone malware patterns by that time, most of anomaly detection techniques used the battery power consumption as the main malware detection system feature [16,17,18]. These techniques were based on checking and monitoring mobile phones power consumption and comparing them with the normal power consumption pattern to detect anomalies.…”
Section: Literature Reviewmentioning
confidence: 99%