Detection of compromise through automated power analysis
A technology for power consumption and data processing equipment, applied in the field of computer implementation, computer program product, power consumption mode of at least one application, power consumption mode system field, and can solve the problems of difficulty in identifying and interpreting power signals.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] In the context of this specification, the following conventions, terms and / or expressions may be used:
[0043] The term "power consumption pattern" may denote a characteristic signal pattern in the power consumption of a data processing device executing software (eg an application), a controller or any other electrical device. Due to varying usage of the processor, memory and / or other components of the data processing apparatus when executing an application, the power consumption of the device may vary in a characteristic manner.
[0044] The term "data processing device" may denote a computer system typically including a processor and memory attached to the processor, a dedicated device for running software, a controller, and I / O devices and the like. Software like operating systems, virtualization layers (eg, hypervisors), device drivers, and applications can be loaded and executed.
[0045] The term "time-stamped current value samples" may denote a continuous seque...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


