Defending battery exhaustion attacks on mobile systems

Sungyong Shin, Taek Lee, Hoh Peter In

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Battery Exhaustion Attack is a "denial of service" attack on mobile devices, causing more battery discharge than normally necessary. The excessive discharge arises out of the limitation in battery capacity. Researches have been conducted to discover the cause of the abnormal usage of handset battery by employing power estimation techniques. It is also important, however, to automatically respond to the attack and maintain the power discharge at the normal level. In this study, we introduce a method designed to detect the defective process and to self-correct the abnormality by stopping or delaying the suspicious actions. The proposed system monitors system calls and the power usage of a local process, and delays activation of the abnormal system calls until the system calls can be run without hampering the battery life. The benefit of our proposed method lies in that it autonomously protects the expected battery lifespan during a battery exhaustion attack without shutting down operation of falsely detected programs.

Original languageEnglish
Title of host publicationProceedings - 2009 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009
Pages347-352
Number of pages6
DOIs
Publication statusPublished - 2009
Event2009 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009 - Seattle, WA, United States
Duration: 2009 Jul 202009 Jul 24

Publication series

NameProceedings - International Computer Software and Applications Conference
Volume2
ISSN (Print)0730-3157

Other

Other2009 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009
Country/TerritoryUnited States
CitySeattle, WA
Period09/7/2009/7/24

Keywords

  • Battery exhaustion attack
  • System call delay;

ASJC Scopus subject areas

  • Software
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Defending battery exhaustion attacks on mobile systems'. Together they form a unique fingerprint.

Cite this