MODELZ: Monitoring, Detection, and Analysis of Energy-Greedy Anomalies in Mobile Handsets

被引:19
作者
Kim, Hahnsang [1 ]
Shin, Kang G. [1 ]
Pillai, Padmanabhan [2 ]
机构
[1] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
[2] Intel Res Lab, Pittsburgh, PA 15213 USA
基金
美国国家科学基金会;
关键词
Power-consumption history; charge flow meter; power signature; chi(2)-distance; moving average filtering;
D O I
10.1109/TMC.2010.245
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is of great importance to protect rapidly-spreading and widely-used small mobile devices like smartphones and PocketPCs from energy-depletion attacks by monitoring software (processes) and hardware (especially, battery) resources. The ability to use these devices for on- and/or off-job functions, and even for medical emergencies or disaster recovery is often dictated by their limited battery capacity. However, traditional malware detection systems and antivirus solutions based on matching signatures are limited to detection of only known malware, and hence, cannot deal with battery-depletion attacks. To meet this challenge, we propose to develop, implement, and evaluate a comprehensive framework, called MODELZ, that MOnitors, DEtects, and anaLyZes energy-greedy anomalies on small mobile devices. MODELZ comprises 1) a charge flow meter that allows infrequent sampling of energy consumption without losing accuracy, 2) a power monitor, in coordination with the charge flow meter, that samples and builds a power-consumption history, and 3) a data analyzer that generates a power signature from the power-consumption history. To generate a power signature, we devise and apply light-weighted, effective noise filtering and data compression, reducing the detection overhead significantly. The similarities between power signatures are measured by the chi(2)-distance and used to lower both false-positive and false-negative detection rates. Our experimental results on an HP iPAQ running the Windows Mobile OS have shown that MODELZ achieves significant (up to 95 percent) storage-savings without losing detection accuracy, and a 99 percent true-positive rate in differentiating legitimate programs from suspicious ones while the monitoring consumes 50 percent less energy than the case of keeping the Bluetooth radio turned on.
引用
收藏
页码:968 / 981
页数:14
相关论文
共 33 条
[21]  
Enck William., 2005, ACM CCS, P393, DOI [10.1145/1102120. 1102171, DOI 10.1145/1102120.1102171]
[22]   Metrics for scene change detection in digital video sequences [J].
Ford, RM ;
Robson, C ;
Temple, D ;
Gerlach, M .
IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS '97, PROCEEDINGS, 1997, :610-611
[23]   BPLRU: A buffer management scheme for improving random writes in flash storage [J].
Kim, Hyojun ;
Ahn, Seongjun .
PROCEEDINGS OF THE 6TH USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES (FAST '08), 2008, :239-252
[24]   Denial-of-service attacks on battery-powered mobile computers [J].
Martin, T ;
Hsiao, M ;
Ha, D ;
Krishnaswami, J .
SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2004, :309-318
[25]  
Mickens JamesW., 2005, WISE 05, P77, DOI DOI 10.1145/1080793.1080806
[26]   Testing and evaluating virus detectors for handheld devices [J].
Morales, Jose Andre ;
Clarke, Peter J. ;
Deng, Yi ;
Kibria, B. M. Golam .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (02) :135-147
[27]   Compressed video processing for cut detection [J].
Patel, NV ;
Sethi, IK .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 1996, 143 (05) :315-323
[28]   The sleep deprivation attack in sensor networks: Analysis and methods of defense [J].
Pirretti, Matthew ;
Zhu, Sencun ;
Vijaykrishnan, N. ;
McDaniel, Patrick ;
Kandemir, Mahmut ;
Brooks, Richard .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2006, 2 (03) :267-287
[29]  
Racic R., 2006, PROC SECURECOMM WORK, P1
[30]   The Bhattacharyya space for feature selection and its application to texture segmentation [J].
Reyes-Aldasoro, CC ;
Bhalerao, A .
PATTERN RECOGNITION, 2006, 39 (05) :812-826