智能手机中未知应用的检测:信号处理视角

R. S. R. James, Abdurhman Albasir, S. Naik, M. Dabbagh, P. Dash, Marzia Zaman, N. Goel
{"title":"智能手机中未知应用的检测:信号处理视角","authors":"R. S. R. James, Abdurhman Albasir, S. Naik, M. Dabbagh, P. Dash, Marzia Zaman, N. Goel","doi":"10.1109/CCECE.2017.7946674","DOIUrl":null,"url":null,"abstract":"Different applications in smartphones result in different power consumption patterns. The fact that every application has been coded to perform certain tasks leads to the claim that every action on-board (whether software or hardware) will consequently have a trace in the power consumption of the smartphone. However, similar power consumption patterns are observed for the same application irrespective of the types of operating system they are executed on. Therefore, it is safe to further claim that no two applications can have similar power consumption patterns as it is highly unlikely that they have exactly the same source code. The idea behind this work is that by analyzing only the power consumption signals of a smartphone, valuable information regarding its operation can be revealed. In view of this, the authors propose a systematic and generic methodology that involves performing some signal processing techniques on the power consumption signals of different applications in smartphones to detect and separate unknown activities/applications from known ones. In this work, we present a proof of concept supported with some test cases to validate the approach. The preliminary results hold promise in detecting malware in smartphones.","PeriodicalId":238720,"journal":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Detection of unknown applications in smartphones: A signal processing perspective\",\"authors\":\"R. S. R. James, Abdurhman Albasir, S. Naik, M. Dabbagh, P. Dash, Marzia Zaman, N. Goel\",\"doi\":\"10.1109/CCECE.2017.7946674\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Different applications in smartphones result in different power consumption patterns. The fact that every application has been coded to perform certain tasks leads to the claim that every action on-board (whether software or hardware) will consequently have a trace in the power consumption of the smartphone. However, similar power consumption patterns are observed for the same application irrespective of the types of operating system they are executed on. Therefore, it is safe to further claim that no two applications can have similar power consumption patterns as it is highly unlikely that they have exactly the same source code. The idea behind this work is that by analyzing only the power consumption signals of a smartphone, valuable information regarding its operation can be revealed. In view of this, the authors propose a systematic and generic methodology that involves performing some signal processing techniques on the power consumption signals of different applications in smartphones to detect and separate unknown activities/applications from known ones. In this work, we present a proof of concept supported with some test cases to validate the approach. The preliminary results hold promise in detecting malware in smartphones.\",\"PeriodicalId\":238720,\"journal\":{\"name\":\"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCECE.2017.7946674\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCECE.2017.7946674","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

不同的智能手机应用会导致不同的功耗模式。每个应用程序都被编码来执行某些任务,这一事实导致人们声称,机上的每个操作(无论是软件还是硬件)都会对智能手机的功耗产生影响。然而,无论在何种类型的操作系统上执行相同的应用程序,都可以观察到类似的功耗模式。因此,可以肯定地说,没有两个应用程序可以具有相似的功耗模式,因为它们极不可能具有完全相同的源代码。这项工作背后的想法是,通过分析智能手机的功耗信号,可以揭示有关其运行的有价值的信息。鉴于此,作者提出了一种系统和通用的方法,该方法涉及对智能手机中不同应用程序的功耗信号执行一些信号处理技术,以检测和分离未知活动/应用程序。在这项工作中,我们提供了一些测试用例支持的概念证明,以验证该方法。初步结果有望用于检测智能手机中的恶意软件。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Detection of unknown applications in smartphones: A signal processing perspective
Different applications in smartphones result in different power consumption patterns. The fact that every application has been coded to perform certain tasks leads to the claim that every action on-board (whether software or hardware) will consequently have a trace in the power consumption of the smartphone. However, similar power consumption patterns are observed for the same application irrespective of the types of operating system they are executed on. Therefore, it is safe to further claim that no two applications can have similar power consumption patterns as it is highly unlikely that they have exactly the same source code. The idea behind this work is that by analyzing only the power consumption signals of a smartphone, valuable information regarding its operation can be revealed. In view of this, the authors propose a systematic and generic methodology that involves performing some signal processing techniques on the power consumption signals of different applications in smartphones to detect and separate unknown activities/applications from known ones. In this work, we present a proof of concept supported with some test cases to validate the approach. The preliminary results hold promise in detecting malware in smartphones.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信