loading page

Exploring and Addressing Power-related Vulnerabilities in Digital Security
  • +2
  • Taku Tanaka ,
  • Keiko Tanaka ,
  • REIKA HOSOMI ,
  • TOMOAKI TANAKA ,
  • HIROTAKA CHIKARAISHI
Taku Tanaka
KYOTO UNIV

Corresponding Author:[email protected]

Author Profile
Keiko Tanaka
Author Profile
REIKA HOSOMI
Author Profile
TOMOAKI TANAKA
Author Profile
HIROTAKA CHIKARAISHI
Author Profile

Abstract

In the current digital landscape, there has been a surge in instances where external entities access information devices, process data on them, and retrieve only the results. While current security measures are designed with the assumption that computer power is sufficiently available, there is a growing need for an integrated security design methodology that takes into consideration scenarios where computer power is limited or rapidly diminishing. Notably, in scenarios where the PC's power source is a battery or in cases of drones and unmanned aerial vehicles, the power supply becomes a paramount resource due to its limitations. Unauthorized consumption of these power resources is tantamount to malware from an intruder's viewpoint. Central to this research is the exploration and discussion of such Integrated Security Design Methods that address this power-related vulnerability. Our objective is to delineate system configurations specifically tailored to safeguard power resources in setups that don't anticipate external power supplies and emphasize the pressing need for these advanced security measures.