R. S. R. James, Abdurhman Albasir, S. Naik, M. Dabbagh, P. Dash, Marzia Zaman, N. Goel
{"title":"智能手机中未知应用的检测:信号处理视角","authors":"R. S. R. James, Abdurhman Albasir, S. Naik, M. Dabbagh, P. Dash, Marzia Zaman, N. Goel","doi":"10.1109/CCECE.2017.7946674","DOIUrl":null,"url":null,"abstract":"Different applications in smartphones result in different power consumption patterns. The fact that every application has been coded to perform certain tasks leads to the claim that every action on-board (whether software or hardware) will consequently have a trace in the power consumption of the smartphone. However, similar power consumption patterns are observed for the same application irrespective of the types of operating system they are executed on. Therefore, it is safe to further claim that no two applications can have similar power consumption patterns as it is highly unlikely that they have exactly the same source code. The idea behind this work is that by analyzing only the power consumption signals of a smartphone, valuable information regarding its operation can be revealed. In view of this, the authors propose a systematic and generic methodology that involves performing some signal processing techniques on the power consumption signals of different applications in smartphones to detect and separate unknown activities/applications from known ones. In this work, we present a proof of concept supported with some test cases to validate the approach. The preliminary results hold promise in detecting malware in smartphones.","PeriodicalId":238720,"journal":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Detection of unknown applications in smartphones: A signal processing perspective\",\"authors\":\"R. S. R. James, Abdurhman Albasir, S. Naik, M. Dabbagh, P. Dash, Marzia Zaman, N. Goel\",\"doi\":\"10.1109/CCECE.2017.7946674\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Different applications in smartphones result in different power consumption patterns. The fact that every application has been coded to perform certain tasks leads to the claim that every action on-board (whether software or hardware) will consequently have a trace in the power consumption of the smartphone. However, similar power consumption patterns are observed for the same application irrespective of the types of operating system they are executed on. Therefore, it is safe to further claim that no two applications can have similar power consumption patterns as it is highly unlikely that they have exactly the same source code. The idea behind this work is that by analyzing only the power consumption signals of a smartphone, valuable information regarding its operation can be revealed. In view of this, the authors propose a systematic and generic methodology that involves performing some signal processing techniques on the power consumption signals of different applications in smartphones to detect and separate unknown activities/applications from known ones. In this work, we present a proof of concept supported with some test cases to validate the approach. The preliminary results hold promise in detecting malware in smartphones.\",\"PeriodicalId\":238720,\"journal\":{\"name\":\"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCECE.2017.7946674\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCECE.2017.7946674","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection of unknown applications in smartphones: A signal processing perspective
Different applications in smartphones result in different power consumption patterns. The fact that every application has been coded to perform certain tasks leads to the claim that every action on-board (whether software or hardware) will consequently have a trace in the power consumption of the smartphone. However, similar power consumption patterns are observed for the same application irrespective of the types of operating system they are executed on. Therefore, it is safe to further claim that no two applications can have similar power consumption patterns as it is highly unlikely that they have exactly the same source code. The idea behind this work is that by analyzing only the power consumption signals of a smartphone, valuable information regarding its operation can be revealed. In view of this, the authors propose a systematic and generic methodology that involves performing some signal processing techniques on the power consumption signals of different applications in smartphones to detect and separate unknown activities/applications from known ones. In this work, we present a proof of concept supported with some test cases to validate the approach. The preliminary results hold promise in detecting malware in smartphones.