What is it about?

Recent attacks have exploited covert channels, such as ultrasound or infrared, to leak sensitive data through your IoT devices. However, no study to date has addressed how to monitor these attacks as there is no network traffic over the air. We utilize power monitoring to interpret power traces and further identify malicious data exfiltration attacks.

Featured Image

Why is it important?

People are more concerned about data privacy than the security of IoT devices. However, the literature has not explored defense approaches against emerging data leakage attacks. Power monitoring is one way, but more thoughtful research is needed to address this stealthy behavior.

Perspectives

I hope this article makes researcher pay attention to the stealthy data leakage events. While power monitoring may also require additional settings at this moment, I envision that power measurement can be served as a complimentary monitoring service in the future, such as in smart city environments.

Woosub Jung
College of William and Mary

Read the Original

This page is a summary of: Light Auditor, November 2022, ACM (Association for Computing Machinery),
DOI: 10.1145/3560905.3568535.
You can read the full text:

Read

Contributors

The following have contributed to this page