What is it about?
Recent attacks have exploited covert channels, such as ultrasound or infrared, to leak sensitive data through your IoT devices. However, no study to date has addressed how to monitor these attacks as there is no network traffic over the air. We utilize power monitoring to interpret power traces and further identify malicious data exfiltration attacks.
Featured Image
Photo by Joshua Sortino on Unsplash
Why is it important?
People are more concerned about data privacy than the security of IoT devices. However, the literature has not explored defense approaches against emerging data leakage attacks. Power monitoring is one way, but more thoughtful research is needed to address this stealthy behavior.
Perspectives
Read the Original
This page is a summary of: Light Auditor, November 2022, ACM (Association for Computing Machinery),
DOI: 10.1145/3560905.3568535.
You can read the full text:
Contributors
The following have contributed to this page