SLIDE 1
Worcester Polytechnic Institute 2
Outline
- Introduction
- Background
- Motivation
- Power Attack Experiments
- Potential Improvements
- Conclusions
Denial-of-Service Attacks on Battery-powered Mobile Computers - - PowerPoint PPT Presentation
Denial-of-Service Attacks on Battery-powered Mobile Computers Thomas Martin, Michael Hsiao, Dong Ha, Jayan Krishnaswami Presented by Kevin Kardian CS 525M Mobile Computing Outline Introduction Background Motivation Power Attack
What makes an attack effective?
How effective can an attack get?
General Methodology
General Methodology (cont.)
Service Request Attack
Benign Power Attack
Malignant Power Attack
Malignant Power Attack (cont.)
Multi-layer Authentication
Multi-layer Authentication (cont.)
Crippling Energy Level
Energy Signature Monitoring