Abstract | ||
---|---|---|
Doze mode, which was introduced from Android 6.0 aiming at reducing battery consumption when the device is unused for a long time. This work firstly reveals the internal details of the battery-saving feature, especially about the state transitions. Furthermore, we discover several defects in Androidu0027s device drivers associated with doze mode. By exploiting the defects, we implement various proof-of-concept attacks that could drain battery without acquiring any permissions by subverting doze mode. The proposed attacks are silent (hardly discerned by normal users), because they keep hidden when the smartphone is in use, while letting benign applications do battery-intensive work when the smartphone is unused rather than consuming excessive power by the attacks themselves. Google has confirmed that our attacks can reduce battery life. Finally, we discuss how to defend against the proposed attacks. |
Year | Venue | Field |
---|---|---|
2016 | GLOBECOM | Android (operating system),Computer science,Battery (electricity),Maintenance engineering,Operating system,Humanoid robot,Embedded system |
DocType | Citations | PageRank |
Conference | 0 | 0.34 |
References | Authors | |
0 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ting Chen | 1 | 153 | 12.80 |
Haiyang Tang | 2 | 0 | 0.34 |
Xiaodong Lin | 3 | 64 | 7.86 |
Kuang Zhou | 4 | 0 | 0.34 |
Xiao-song Zhang | 5 | 305 | 45.10 |