もっと詳しく

The development of technology has brought more and more electronic devices into our lives. For example, a mobile phone, a product that weighs less than half a catty, carries most of the applications in life, such as payment, photography, social interaction, entertainment, and basically all personal information will be stored in this small mobile phone.

It is precisely because it has the property of a personal information container that some people with ulterior motives use various methods to steal information. For example, developing a free application software, or sending a text message with a link to plant a Trojan horse into a mobile phone, so as to obtain various data and behavior habits of mobile phone users.

Of course, this method has been controlled with more and more control and the continuous upgrading of system security, and then another method of stealing information has surfaced, and it is more powerful, higher-end, and also oriented towards equipment. Not just a phone, but not easy to spot.

This more powerful and high-end method,That is, the Trojan is directly packaged into the chip or fixed in the circuit board,So as to achieve the purpose of obtaining sensitive information, and this operation is extremely concealed and difficult to be discovered. Many countries and institutions are also studying how to find out whether the device has been placed in a “hard Trojan” method.

A team of researchers at a University in Missouri recently seems to have solved the problem. They created a test called PDNPulse,The test is based on measuring the power consumption of a printed circuit board to discover and find small changes in the so-called “fingerprint” of power consumption,At the same time, compared with known security devices, this method can find whether the device has been implanted with “hard Trojan horses”.

The team says that the characteristics of power consumption are inevitably affected by modifications to the chip or circuit board, no matter how small. In tests, the researchers were able to detect changes in the “hard trojan” on various circuit boards with 100 percent accuracy.

In layman’s terms, the power consumption of a device with a “hard Trojan” is higher than that of the same device without a “hard Trojan”. In fact, this principle is also suitable for evaluating the “Trojan horse” of the software layer.When the power consumption of the device increases, it may be that unknown software resides in the front and back and frequently calls the network, resulting in shorter standby time.

Of course, it is still unknown whether this method is really accurate, because there are many human factors. For example, in order to discredit a company, testers can install a “hard Trojan” in it before testing. Therefore, the corresponding testing supervision also needs to be strengthened, and it should be internationalized, otherwise it is very likely to become a smear tool.

Hashtag: Smartphone Trojan virus chip

.
[related_posts_by_tax taxonomies=”post_tag”]

The post When the power consumption of your mobile phone is abnormal, it is very likely that a “core” level Trojan has been planted-Smartphones, Chips, Trojans–Kui Technology (Media of Drive Home)–Technology changes the future appeared first on Gamingsym.