Jie Su
Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices
Su, Jie; Hong, Zhen; Ye, Lei; Liu, Tao; Liang, Sizhuang; Ji, Shouling; Aujla, Gagangeet Singh; Beyah, Reheem; Wen, Zhenyu
Authors
Zhen Hong
Lei Ye
Tao Liu
Sizhuang Liang
Shouling Ji
Dr Gagangeet Aujla gagangeet.s.aujla@durham.ac.uk
Associate Professor in Computer Science
Reheem Beyah
Zhenyu Wen
Abstract
As a typical representative of the Internet of Energy (IoE) intelligent era, consumer electronic (CE) devices continue to evolve at a remarkable pace. Computers, as typical and essential CE devices, have been instrumental in enhancing efficiency, communication, entertainment, and information access. As part of this evolution, a significant trend in computer design focuses on achieving low power consumption while maintaining high performance. For instance, a computer’s central processing unit (CPU) dynamically modulates its output power in response to the varying workload demands of running applications. However, these power efficiency mechanisms may inadvertently introduce implicit patterns into the operational states of CE devices. Particularly, the power consumption of a CE device executing various tasks can manifest distinguishable temporal patterns, thereby exposing potential vulnerabilities. Thus, this work aims to investigate the vulnerabilities of CE devices on power consumption mechanisms. We focus on exploring the possibility of using alternating current (AC) power consumption to infer the running applications on a consumer computer. To achieve that, we construct a physical attack system that employs data acquisition, processing, classification, and inference stages to establish a “profiler" for application profiling. The extensive experiment results on the self-collected power consumption dataset (36 applications) demonstrate the effectiveness of the attacking system.
Citation
Su, J., Hong, Z., Ye, L., Liu, T., Liang, S., Ji, S., Aujla, G. S., Beyah, R., & Wen, Z. (online). Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices. IEEE Transactions on Consumer Electronics, 70(1), 4605 - 4616. https://doi.org/10.1109/tce.2023.3347651
Journal Article Type | Article |
---|---|
Acceptance Date | Dec 16, 2023 |
Online Publication Date | Dec 27, 2023 |
Deposit Date | Apr 8, 2024 |
Publicly Available Date | Apr 11, 2024 |
Journal | IEEE Transactions on Consumer Electronics |
Print ISSN | 0098-3063 |
Electronic ISSN | 1558-4127 |
Publisher | Institute of Electrical and Electronics Engineers |
Peer Reviewed | Peer Reviewed |
Volume | 70 |
Issue | 1 |
Pages | 4605 - 4616 |
DOI | https://doi.org/10.1109/tce.2023.3347651 |
Keywords | Electrical and Electronic Engineering; Media Technology |
Public URL | https://durham-repository.worktribe.com/output/2380008 |
Files
Accepted Journal Article
(6.9 Mb)
PDF
Licence
http://creativecommons.org/licenses/by/4.0/
Copyright Statement
This accepted manuscript is licensed under the Creative Commons Attribution 4.0 licence. https://creativecommons.org/licenses/by/4.0/
You might also like
Uncovering hidden and complex relations of pandemic dynamics using an AI driven system
(2024)
Journal Article
Trusted Explainable AI for 6G-Enabled Edge Cloud Ecosystem
(2023)
Journal Article
Downloadable Citations
About Durham Research Online (DRO)
Administrator e-mail: dro.admin@durham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search