Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Mar 30, 2017 · Abstract: Differently from attacks aimed at gaining control of the resources of a mobile device, energy-related attacks have the essential ...
For mobile computers, a monitoring agent that checks battery usage searching for anomalous currents, raising alerts upon their detection, is presented in. The ...
... Battery discharge models and energy vulnerability due to operating systems have been investigated [30,47]. A more recent study plays multimedia files ...
Racic et al. [23] demonstrated an attack that can aggressively drain mobile device battery, which heavily affects performance and render the device useless. The ...
We demonstrate an attack, which surreptitiously drains mobile devices' battery power up to 22 times faster and therefore could render these devices useless ...
Missing: Smart | Show results with:Smart
Feb 11, 2018 · Yes, but not directly. A phone's firmware could get compromised and have code on it continuously run causing the battery to drain quicker ...
An attack is demonstrated, which surreptitiously drains mobile devices' battery power up to 22 times faster and therefore could render these devices useless ...
channel to drain mobile devices' battery power. We were able to drain batteries without alerting either the mobile user victims or the cellular network ...
Apr 5, 2020 · This study analyzed the security vulnerabilities of the Wi-Fi power-saving mechanism used in smart devices and experimentally proved the ...
Oct 14, 2018 · It is technically possible for a hacker to exploit certain vulnerabilities in your phone's operating system or network to gain unauthorized ...