2016-08-242016-08-242011-01-25http://hdl.handle.net/10919/72659Software attacks such as worms and viruses are detected in an electronic device by monitoring power consumption patterns. In a first embodiment, software attacks are detected by an increase in power consumption. The increased power consumption can be caused by increased network traffic, or by increased activity in the microprocessor. Monitoring power consumption is particularly effective for detecting DOS/flooding attacks when the electronic device is in an idle state. In a second embodiment, a power consumption signal is converted to the frequency domain (e.g., by fast Fourier transform). The highest amplitude frequencies are identified. Specific software attacks produce characteristic frequencies in the power consumption signal. Software attacks are therefore detected by matching the highest amplitude frequencies with frequencies associated with specific worms and viruses. Identification of a particular software attack typically requires matching of 3 or more of the highest amplitude frequencies, and, optionally, amplitude information.application/pdfen-USDetecting software attacks by monitoring electric power consumption patternsPatenthttp://pimg-fpiw.uspto.gov/fdd/21/776/078/0.pdf11574619713/340713/300726/24726/25G06F21/554G06F21/55G06F21/817877621