MODELZ: Monitoring, Detection, and Analysis of Energy-Greedy Anomalies in Mobile Handsets

被引:19
作者
Kim, Hahnsang [1 ]
Shin, Kang G. [1 ]
Pillai, Padmanabhan [2 ]
机构
[1] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
[2] Intel Res Lab, Pittsburgh, PA 15213 USA
基金
美国国家科学基金会;
关键词
Power-consumption history; charge flow meter; power signature; chi(2)-distance; moving average filtering;
D O I
10.1109/TMC.2010.245
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is of great importance to protect rapidly-spreading and widely-used small mobile devices like smartphones and PocketPCs from energy-depletion attacks by monitoring software (processes) and hardware (especially, battery) resources. The ability to use these devices for on- and/or off-job functions, and even for medical emergencies or disaster recovery is often dictated by their limited battery capacity. However, traditional malware detection systems and antivirus solutions based on matching signatures are limited to detection of only known malware, and hence, cannot deal with battery-depletion attacks. To meet this challenge, we propose to develop, implement, and evaluate a comprehensive framework, called MODELZ, that MOnitors, DEtects, and anaLyZes energy-greedy anomalies on small mobile devices. MODELZ comprises 1) a charge flow meter that allows infrequent sampling of energy consumption without losing accuracy, 2) a power monitor, in coordination with the charge flow meter, that samples and builds a power-consumption history, and 3) a data analyzer that generates a power signature from the power-consumption history. To generate a power signature, we devise and apply light-weighted, effective noise filtering and data compression, reducing the detection overhead significantly. The similarities between power signatures are measured by the chi(2)-distance and used to lower both false-positive and false-negative detection rates. Our experimental results on an HP iPAQ running the Windows Mobile OS have shown that MODELZ achieves significant (up to 95 percent) storage-savings without losing detection accuracy, and a 99 percent true-positive rate in differentiating legitimate programs from suspicious ones while the monitoring consumes 50 percent less energy than the case of keeping the Bluetooth radio turned on.
引用
收藏
页码:968 / 981
页数:14
相关论文
共 33 条
[1]  
Anand M., 2004, P 9 INT C MOBILE SYS, P23
[2]  
[Anonymous], P IEEE INT C PORT IN
[3]  
[Anonymous], 54815A INF OSC SPEC
[4]  
[Anonymous], SYM MAK HANDH SEC PR
[5]  
[Anonymous], SPEC BLUET SYST COR
[6]  
[Anonymous], P 17 ACM S OP SYST P
[7]  
[Anonymous], UPX ULTIMATE PACKER
[8]  
[Anonymous], P 22 ANN CS APPL C A
[9]  
[Anonymous], MAX4071 MAXIM
[10]  
[Anonymous], SCI AM NOV