CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems
The widespread use of the Internet of Things (IoT) has led to a surge in interconnected, resource-constrained embedded systems, which are inherently vulnerable due to limited security mechanisms. This paper presents CARNYX, a framework leveraging power consumption analysis, rooted in Side-Channel An...
Saved in:
Published in | International journal of information security Vol. 24; no. 4; p. 172 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.08.2025
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The widespread use of the Internet of Things (IoT) has led to a surge in interconnected, resource-constrained embedded systems, which are inherently vulnerable due to limited security mechanisms. This paper presents CARNYX, a framework leveraging power consumption analysis, rooted in Side-Channel Analysis (SCA), to detect vulnerabilities in embedded systems with high accuracy. Designed for pre-deployment vulnerability detection, it offers three key advantages over existing SCA solutions: (1) detailed categorisation of specific vulnerability types beyond binary detection, (2) a methodology validated on the STM32F4 architecture and ARM Cortex-A8 with potential applicability to similar low- and medium-end systems, and (3) reliable detection in resource-constrained devices where power monitoring is practical. We evaluate CARNYX on three platforms: two low-end STM32F4-based platforms (Riscure Piñata and STM NUCLEO-144) and the medium-end ARM Cortex-A8-based BeagleBone Black, analysing 16 arithmetic and memory-related software flaws. Results demonstrate recall rates of 99.69% (Piñata), 86.88% (NUCLEO-144 with serial interface), 51.25% (NUCLEO-144 with Ethernet), and 53.67% (BeagleBone Black)-all with high precision-while measuring the effect of communication peripherals on side-channel leakage, an aspect underexplored in prior vulnerability detection studies. These results highlight CARNYX’s potential to enhance security in constrained IoT devices, even in noisy environments where binary detection methods offer limited value. While validated on STM32F4 and ARM Cortex-A8, its principles may extend to other low- and medium-end systems, subject to further validation. |
---|---|
AbstractList | The widespread use of the Internet of Things (IoT) has led to a surge in interconnected, resource-constrained embedded systems, which are inherently vulnerable due to limited security mechanisms. This paper presents CARNYX, a framework leveraging power consumption analysis, rooted in Side-Channel Analysis (SCA), to detect vulnerabilities in embedded systems with high accuracy. Designed for pre-deployment vulnerability detection, it offers three key advantages over existing SCA solutions: (1) detailed categorisation of specific vulnerability types beyond binary detection, (2) a methodology validated on the STM32F4 architecture and ARM Cortex-A8 with potential applicability to similar low- and medium-end systems, and (3) reliable detection in resource-constrained devices where power monitoring is practical. We evaluate CARNYX on three platforms: two low-end STM32F4-based platforms (Riscure Piñata and STM NUCLEO-144) and the medium-end ARM Cortex-A8-based BeagleBone Black, analysing 16 arithmetic and memory-related software flaws. Results demonstrate recall rates of 99.69% (Piñata), 86.88% (NUCLEO-144 with serial interface), 51.25% (NUCLEO-144 with Ethernet), and 53.67% (BeagleBone Black)-all with high precision-while measuring the effect of communication peripherals on side-channel leakage, an aspect underexplored in prior vulnerability detection studies. These results highlight CARNYX’s potential to enhance security in constrained IoT devices, even in noisy environments where binary detection methods offer limited value. While validated on STM32F4 and ARM Cortex-A8, its principles may extend to other low- and medium-end systems, subject to further validation. |
ArticleNumber | 172 |
Author | Eceiza, Maialen Barredo, Jorge Iturbe, Mikel Flores, Jose Luis |
Author_xml | – sequence: 1 givenname: Jorge orcidid: 0000-0001-5552-6825 surname: Barredo fullname: Barredo, Jorge email: jbarredo@ikerlan.es organization: IKERLAN Technology Research Centre, Mondragon Unibertsitatea, IKERLAN Technology Research Centre – sequence: 2 givenname: Maialen orcidid: 0000-0001-7755-2848 surname: Eceiza fullname: Eceiza, Maialen organization: IKERLAN Technology Research Centre, Mondragon Unibertsitatea – sequence: 3 givenname: Jose Luis orcidid: 0000-0002-5555-9712 surname: Flores fullname: Flores, Jose Luis organization: University of the Basque Country UPV/EHU – sequence: 4 givenname: Mikel orcidid: 0000-0001-9641-5646 surname: Iturbe fullname: Iturbe, Mikel organization: IKERLAN Technology Research Centre |
BookMark | eNp9kF1LwzAUhoNMcE7_gFcBr6v5aNLMuzH8gqEgCnoV0vZEOtukJt1G_711Fb3z6hwOz_tyeI7RxHkHCJ1RckEJyS4jJYxkCWEiIZTMWcIO0JRKKhLBMjL53SU7QscxrglhA0anKF8unh7eXq_wAttgGtj58IGtD3i7qR0Ek1d11fW4hA6KrvIObyuDW7-DgAvv4qZp91fjTN3HKuLKYWhyKEsocexjB008QYfW1BFOf-YMvdxcPy_vktXj7f1ysUoKTmWXACGKF6mVpRGcFuk8Z2AU5ZIxMs-sBUGzgiquLKTcgCoyYk0upREqZQqAz9D52NsG_7mB2Om134Thsag5Y4pKwYUYKDZSRfAxBrC6DVVjQq8p0d8u9ehSDy713qVmQ4iPoTjA7h3CX_U_qS-CwXlf |
Cites_doi | 10.1145/3316781.3323480 10.1186/s12864-019-6413-7 10.1145/3015135.3015141 10.1109/TVLSI.2023.3335876 10.1371/journal.pone.0210236 10.1007/s43926-022-00021-2 10.1109/TCE.2004.1309414 10.1109/ICDMW.2017.152 10.1007/978-0-387-38162-6 10.1186/s42400-022-00123-y 10.1109/ACCESS.2021.3119220 10.1145/1015047.1015049 10.1109/COMST.2019.2962586 10.1145/1456455.1456460 10.1145/3139937.3139938 10.1109/JIOT.2021.3078072 10.1177/0049124104268644 10.1145/3477314.3507030 10.1007/978-3-319-45931-8_9 10.14722/ndss.2014.23229 10.1007/978-3-540-85053-3_27 10.1007/BF00134682. 10.1145/313817.313834 10.1109/ACCESS.2021.3052867 10.1117/12.2311329 10.1016/j.cose.2023.103180 10.1016/0169-7439(87)80084-9 10.1145/3446997 10.1109/ISCISC.2014.6994033 10.1109/JIOT.2021.3056179 10.14722/ndss.2018.23166 10.1049/ip-smt:19990001 10.18653/v1/2022.nlppower-1.4 10.18280/rces.090205 10.1007/978-3-030-88418-5_5 10.1049/wss2.12054 10.1016/J.COMPCHEMENG.2006.09.004 10.1109/THS.2008.4534479 10.1109/IJCNN.2017.7966373 10.21105/joss.00205 10.1007/s13389-011-0023-x 10.1016/B978-1-85617-751-1.00001-X 10.3390/cryptography4040030 10.1145/3485832.3485894 10.1002/widm.30 10.1145/3320269.3384727 10.1007/978-3-642-33338-5_5 10.1007/978-981-10-7563-6_53 10.1109/TC.2019.2945767 10.1109/JIOT.2019.2935189 10.1016/j.eswa.2021.115531 10.1109/PST.2015.7232966 |
ContentType | Journal Article |
Copyright | The Author(s) 2025 The Author(s) 2025. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: The Author(s) 2025 – notice: The Author(s) 2025. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | C6C AAYXX CITATION 7SC 8FD JQ2 K7. L7M L~C L~D |
DOI | 10.1007/s10207-025-01092-2 |
DatabaseName | Springer Nature OA Free Journals CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection ProQuest Criminal Justice (Alumni) Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef ProQuest Criminal Justice (Alumni) Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | ProQuest Criminal Justice (Alumni) |
Database_xml | – sequence: 1 dbid: C6C name: Springer Nature OA Free Journals (WRLC) url: http://www.springeropen.com/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1615-5270 |
ExternalDocumentID | 10_1007_s10207_025_01092_2 |
GrantInformation_xml | – fundername: Basque Government grantid: IT1676-22 – fundername: AEI/10.13039/501100011033, FEDER and UE grantid: PLEC2024-011222; PLEC2024-011222; PLEC2024-011222 |
GroupedDBID | -~C .86 .DC .VR 06D 0R~ 0VY 1N0 203 29J 2J2 2JN 2JY 2KG 2LR 2~H 30V 4.4 406 408 409 40D 40E 5GY 5VS 67Z 6NX 7WY 8FL 8TC 8VB 95- 95. 95~ 96X AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAPKM AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBRH ABBXA ABDBE ABDBF ABDZT ABECU ABFSG ABFTD ABFTV ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABWNU ABXPI ACAOD ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACSTC ACZOJ ADHHG ADHIR ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEFQL AEGNC AEJHL AEJRE AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AEZWR AFBBN AFDZB AFHIU AFLOW AFOHR AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHPBZ AHWEU AHYZX AIAKS AIGIU AIIXL AILAN AITGF AIXLP AJRNO AJZVZ AKVCP ALMA_UNASSIGNED_HOLDINGS ALSLI ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARMRJ ASPBG ATHPR AVWKF AXYYD AYFIA AYJHY AZFZN B-. BA0 BENPR BGNMA BSONS C6C CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EAP EBLON EBR EBS EBU EIOEI ESBYG EST ESX FEDTE FERAY FFXSO FIGPU FNLPD FRRFC FWDCC GGCAI GGRSB GJIRD GNWQR GQ7 GQ8 GXS HCIFZ HF~ HG5 HG6 HLICF HMJXF HQYDN HRMNR HVGLF I09 IHE IJ- IKXTQ ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6~ KDC KOV LAS LLZTM M0O M4Y MA- NB0 NPVJJ NQJWS NU0 O93 O9J P2P P9O PF0 PQBIZ PT4 QOS QWB R89 R9I RNS ROL RPX RSV S16 S1Z S27 S3B SAP SCO SDH SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TN5 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 ZL0 ZMTXR ~A9 -Y2 .4S 0-V 1SB 2P1 2VQ 6KP 8AO 8FE 8FG 8FW AARHV AAYXX ABQSL ABRTQ ABULA ABUWG ACBXY ACUHS ADHKG ADMLS AEBTG AEKMD AEMOZ AFGCZ AFKRA AGQPQ AHQJS AHSBF AJBLW ARALO ARCSS AZQEC B0M BDATZ BEZIV BGLVJ BGRYB BPHCQ CAG CCPQU CITATION COF DWQXO EAD EBA ECS EDO EIS EJD EMK EPL FIL FINBP FRNLG FSGXE GNUQQ H13 HZ~ I-F K1G K6V K7- M0C M1Q N2Q O9- P62 PHGZM PHGZT PQBZA PQGLB PQQKQ PROAC PRQQA Q2X TH9 TUS ~8M 7SC 8FD JQ2 K7. L7M L~C L~D |
ID | FETCH-LOGICAL-c316t-e0083c4f6da531c49b2ea813622097ffe517c1838fe43ae8c70fab66a58428ee3 |
IEDL.DBID | C6C |
ISSN | 1615-5262 |
IngestDate | Sat Aug 16 19:52:58 EDT 2025 Wed Jul 16 16:44:23 EDT 2025 Thu Jul 10 06:06:18 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Keywords | Embedded systems Side-channel analysis Hardware security Vulnerability detection |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c316t-e0083c4f6da531c49b2ea813622097ffe517c1838fe43ae8c70fab66a58428ee3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-7755-2848 0000-0001-9641-5646 0000-0002-5555-9712 0000-0001-5552-6825 |
OpenAccessLink | https://doi.org/10.1007/s10207-025-01092-2 |
PQID | 3228165355 |
PQPubID | 43999 |
ParticipantIDs | proquest_journals_3228165355 crossref_primary_10_1007_s10207_025_01092_2 springer_journals_10_1007_s10207_025_01092_2 |
PublicationCentury | 2000 |
PublicationDate | 2025-08-01 |
PublicationDateYYYYMMDD | 2025-08-01 |
PublicationDate_xml | – month: 08 year: 2025 text: 2025-08-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Berlin/Heidelberg |
PublicationPlace_xml | – name: Berlin/Heidelberg – name: Heidelberg |
PublicationTitle | International journal of information security |
PublicationTitleAbbrev | Int. J. Inf. Secur |
PublicationYear | 2025 |
Publisher | Springer Berlin Heidelberg Springer Nature B.V |
Publisher_xml | – name: Springer Berlin Heidelberg – name: Springer Nature B.V |
References | L Batina (1092_CR33) 2019 WA Johnson (1092_CR7) 2021 DP Pham (1092_CR45) 2021 1092_CR61 1092_CR60 W Bolton (1092_CR25) 2009 1092_CR63 1092_CR21 1092_CR6 1092_CR20 1092_CR64 1092_CR9 1092_CR23 1092_CR8 1092_CR66 1092_CR24 1092_CR26 1092_CR28 R Hegde (1092_CR53) 1999 1092_CR3 X Wang (1092_CR41) 2018 1092_CR5 M Eceiza (1092_CR27) 2021 1092_CR1 S Wold (1092_CR54) 1987 KP Burnham (1092_CR55) 2004 1092_CR30 1092_CR32 1092_CR31 1092_CR36 G Betta (1092_CR50) 1999 1092_CR35 1092_CR38 1092_CR37 VA Thakor (1092_CR34) 2021 1092_CR39 Z Abbasi (1092_CR46) 2014 G Hospodar (1092_CR16) 2011 HP Vinutha (1092_CR52) 2018 S Mangard (1092_CR51) 2007 M Tamura (1092_CR62) 2007 S Ravi (1092_CR4) 2004 Y Bai (1092_CR48) 2022 S Moore (1092_CR42) 2016 F Meneghello (1092_CR2) 2019 1092_CR40 1092_CR43 1092_CR44 P Wang (1092_CR47) 2017 B Gierlichs (1092_CR19) 2008 1092_CR49 D Kleidermacher (1092_CR11) 2008 G Ara (1092_CR22) 2022 S Picek (1092_CR14) 2017 D Couroussé (1092_CR65) 2016 J Winter (1092_CR29) 2008 1092_CR12 1092_CR56 MA Ferrag (1092_CR10) 2021 U Rioja (1092_CR15) 2021 1092_CR13 1092_CR57 HP Kriegel (1092_CR58) 2011 1092_CR59 1092_CR18 1092_CR17 |
References_xml | – ident: 1092_CR5 – year: 2019 ident: 1092_CR33 publication-title: Security doi: 10.1145/3316781.3323480 – ident: 1092_CR61 doi: 10.1186/s12864-019-6413-7 – year: 2016 ident: 1092_CR42 publication-title: Buffer overflow attack’s power consumption signatures doi: 10.1145/3015135.3015141 – ident: 1092_CR43 doi: 10.1109/TVLSI.2023.3335876 – ident: 1092_CR56 doi: 10.1371/journal.pone.0210236 – year: 2022 ident: 1092_CR48 publication-title: Real-time instruction-level verification of remote IoT/CPS devices via side channels doi: 10.1007/s43926-022-00021-2 – ident: 1092_CR26 doi: 10.1109/TCE.2004.1309414 – year: 2017 ident: 1092_CR47 publication-title: Control doi: 10.1109/ICDMW.2017.152 – year: 2007 ident: 1092_CR51 publication-title: Power Analysis Attacks: Revealing the Secrets of Smart Cards doi: 10.1007/978-0-387-38162-6 – ident: 1092_CR13 doi: 10.1186/s42400-022-00123-y – ident: 1092_CR36 – ident: 1092_CR59 – year: 2021 ident: 1092_CR7 publication-title: A Taxonomy and Review of Remote Attestation Schemes in Embedded Systems doi: 10.1109/ACCESS.2021.3119220 – year: 2004 ident: 1092_CR4 publication-title: Security in Embedded Systems: Design Challenges doi: 10.1145/1015047.1015049 – ident: 1092_CR8 doi: 10.1109/COMST.2019.2962586 – ident: 1092_CR6 – year: 2008 ident: 1092_CR29 publication-title: Trusted computing building blocks for embedded linux-based ARM trustzone platforms doi: 10.1145/1456455.1456460 – ident: 1092_CR32 – ident: 1092_CR9 doi: 10.1145/3139937.3139938 – year: 2021 ident: 1092_CR10 publication-title: The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial doi: 10.1109/JIOT.2021.3078072 – year: 2004 ident: 1092_CR55 publication-title: Multimodel inference: understanding AIC and BIC in model selection doi: 10.1177/0049124104268644 – year: 2022 ident: 1092_CR22 publication-title: Simulating execution time and power consumption of real-time tasks on embedded platforms doi: 10.1145/3477314.3507030 – year: 2016 ident: 1092_CR65 publication-title: Runtime code polymorphism as a protection against side channel attacks doi: 10.1007/978-3-319-45931-8_9 – ident: 1092_CR12 doi: 10.14722/ndss.2014.23229 – ident: 1092_CR63 – year: 2008 ident: 1092_CR19 publication-title: Mutual Information Analysis doi: 10.1007/978-3-540-85053-3_27 – ident: 1092_CR49 – ident: 1092_CR24 doi: 10.1007/BF00134682. – year: 1999 ident: 1092_CR53 publication-title: Energy-efficient signal processing via algorithmic noise-tolerance doi: 10.1145/313817.313834 – ident: 1092_CR66 – ident: 1092_CR18 – year: 2021 ident: 1092_CR34 publication-title: Comparison and Research Opportunities doi: 10.1109/ACCESS.2021.3052867 – year: 2018 ident: 1092_CR41 publication-title: Deep learning-based classification and anomaly detection of side-channel signals doi: 10.1117/12.2311329 – ident: 1092_CR35 – ident: 1092_CR30 doi: 10.1016/j.cose.2023.103180 – year: 1987 ident: 1092_CR54 publication-title: Principal component analysis doi: 10.1016/0169-7439(87)80084-9 – year: 2021 ident: 1092_CR15 publication-title: The Uncertainty of Side-Channel Analysis: A Way to Leverage from Heuristics doi: 10.1145/3446997 – year: 2014 ident: 1092_CR46 publication-title: Anomaly detection in embedded systems using simultaneous power and temperature monitoring doi: 10.1109/ISCISC.2014.6994033 – year: 2021 ident: 1092_CR27 publication-title: Fuzzing the Internet of Things: A Review on the Techniques and Challenges for Efficient Vulnerability Discovery in Embedded Systems doi: 10.1109/JIOT.2021.3056179 – ident: 1092_CR28 doi: 10.14722/ndss.2018.23166 – year: 1999 ident: 1092_CR50 publication-title: Structured approach to estimate the measurement uncertainty in digital signal elaboration algorithms doi: 10.1049/ip-smt:19990001 – ident: 1092_CR60 doi: 10.18653/v1/2022.nlppower-1.4 – ident: 1092_CR1 doi: 10.18280/rces.090205 – ident: 1092_CR64 – ident: 1092_CR17 doi: 10.1007/978-3-030-88418-5_5 – ident: 1092_CR21 doi: 10.1049/wss2.12054 – year: 2007 ident: 1092_CR62 publication-title: A study on the number of principal components and sensitivity of fault detection using PCA doi: 10.1016/J.COMPCHEMENG.2006.09.004 – year: 2008 ident: 1092_CR11 publication-title: Integrating Static Analysis into a Secure Software Development Process doi: 10.1109/THS.2008.4534479 – year: 2017 ident: 1092_CR14 publication-title: Side-channel analysis and machine learning: A practical perspective doi: 10.1109/IJCNN.2017.7966373 – ident: 1092_CR38 – ident: 1092_CR3 – ident: 1092_CR57 doi: 10.21105/joss.00205 – year: 2011 ident: 1092_CR16 publication-title: Machine learning in side-channel analysis: A first study doi: 10.1007/s13389-011-0023-x – year: 2009 ident: 1092_CR25 publication-title: Programmable Logic Controllers doi: 10.1016/B978-1-85617-751-1.00001-X – ident: 1092_CR40 doi: 10.3390/cryptography4040030 – year: 2021 ident: 1092_CR45 publication-title: Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification doi: 10.1145/3485832.3485894 – year: 2011 ident: 1092_CR58 publication-title: Density-based clustering doi: 10.1002/widm.30 – ident: 1092_CR44 doi: 10.1145/3320269.3384727 – ident: 1092_CR31 doi: 10.1007/978-3-642-33338-5_5 – year: 2018 ident: 1092_CR52 publication-title: Detection of Outliers Using Interquartile Range Technique from Intrusion Dataset doi: 10.1007/978-981-10-7563-6_53 – ident: 1092_CR20 doi: 10.1109/TC.2019.2945767 – year: 2019 ident: 1092_CR2 publication-title: A Survey of Practical Security Vulnerabilities in Real IoT Devices doi: 10.1109/JIOT.2019.2935189 – ident: 1092_CR23 doi: 10.1016/j.eswa.2021.115531 – ident: 1092_CR39 doi: 10.1109/PST.2015.7232966 – ident: 1092_CR37 |
SSID | ssj0021091 |
Score | 2.3648968 |
Snippet | The widespread use of the Internet of Things (IoT) has led to a surge in interconnected, resource-constrained embedded systems, which are inherently vulnerable... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Index Database Publisher |
StartPage | 172 |
SubjectTerms | Access control Automation Coding and Information Theory Communications Engineering Computer Communication Networks Computer Science Constraints Cryptology Cybersecurity Embedded systems Ethernet Internet of Things Management of Computing and Information Systems Networks Operating Systems Power consumption Power management Regular Contribution Serial interfaces Software Software reliability Taxonomy |
Subtitle | CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems |
Title | CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems |
URI | https://link.springer.com/article/10.1007/s10207-025-01092-2 https://www.proquest.com/docview/3228165355 |
Volume | 24 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF7EXrz4Fqu17MGbBpJN9lFvaWgtij2IhfYUNptZKGgs9gH-e2fTxGLRg5fkkLCHbzMz32RnviHkGgLpy5yDl4U5JigssJ5WwD2eG-ZnkbCRcY3CT0MxGEUPYz6uZHJcL8zW-b1rcWPuZxpzJWZ-h3nobhs8CKUb05CI5Du5cgKXLrnCCI3JlWBVg8zva_wMQhtmuXUYWsaY_iHZr8ghjde7eUR2oDgmB_XgBVrZ4QnJkvh5OBnf0ZjauriKIvukq-WrU5EuC14_aQ6LstCqoKuppjM3D42asuWy9BNUV4IkdFpQeMsAfVBO19LO81My6vdekoFXDUvwTBiIhQeOTJnIilyjWZmokzHQKsD4xPyOtBZ4IA3ar7IQhRqUkb7VmRAaGQhTAOEZ2S3eCzgnVAlfGctDbRVgfEc3pDBT0zmTCgmX5E1yU6OXztaaGOlG_dhhnSLWaYl1ypqkVQOcVvYxT9GNqEBwJDtNcluDvnn892oX_3v9kuyxct9dxV6L7C4-lnCFLGKRtUkj7ne7Q3e_nzz22uXnhNcRi78ATRzAtg |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwEB1BOcCFHVFWH-AEkRIncVwkDhWLytYDolI5BccZS0gQEC2g_g8fythNKCA4cOCcyLJexs9v4jdjgC0MEj_JY_SyMKcEhQfGUxJjL84197NImEjbQuGLtmh1otNu3B2Dt6oWxrndqyNJx9Sfit24_a3GrdnMb3CPl1bKMxy8UqLW2z85pK-6zfnx0dVByyvvEvB0GIi-h1Zr6MiIXFHU6aiRcVQyIPrmfiMxBuMg0RTe0mAUKpQ68Y3KhFC0QXOJGNK44zBB4kPatdPhzY-0zrbWtGkdaQNK6wQvS3N-nvPX7W-kab8dw7rd7XgWpktZyprDOJqDMSzmYaa68oGVDLAA2UHzsn3d3WNNZipbFyPdy16e72z_ame1HbAc-87iVbCXW8Ue7U1sTLtiT8dQTJWtUNhtwfA-Q2K_nA2bSvcWofMv0C5BrXgocBmYFL7UJg6VkUjKgghQUo6ocp5IknpJXIedCr30cdiNIx31XbZYp4R16rBOeR3WKoDTcmX2UiIwGYiYZFYddivQR49_H23lb69vwmTr6uI8PT9pn63CFHcxYH2Da1DrPz3jOmmZfrbhQonBzX_H7jvzWf20 |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3BbtNAEB2lQUK9AIVWDYR2D3CiVuy1vd5U4hAljRICEUKNlJ7c9XpWqtSaiDhB-Ss-sbMbmwCCA4eeba2s8Xj2Pe-bNwBvMEj8JI_Ry8KcCAoPjKckxl6ca-5nkTCRto3Cn6ZiNIs-zON5A37UvTBO7V4fSW57GqxLU1F2Frnp_NL4xu0vNm6FZ36Xe7ySVU5w851I2_L9eEBv-C3nw4vL_sir5gp4OgxE6aHFHToyIleUgTrqZhyVDKiUc7-bGINxkGhKdWkwChVKnfhGZUIo2qy5RAxp3T14RMwosHSvL_o_KZ612bQUj3ACUTzBqzadvz_z71vhDt_-cSTrdrrhM3hSQVTW2-bUATSweA5P6_EPrKoGLyDr975Mr-bnrMdMLfFihIHZenVrvayd7HbDciyd3Ktg6xvFFnYqG9Ou8dNVK6YqWxR2UzC8y5AqYc62BtPLQ5g9SGiPoFl8LfAYmBS-1CYOlZFIKIOKoSS-qHKeSIJ9SdyCd3X00sXWmSPdeTDbWKcU69TFOuUtaNcBTquvdJlSMZOBiAlyteCsDvru8r9Xe_l_t5_C48-DYfpxPJ28gn3uUsBKCNvQLL-t8DXBmjI7cZnE4PqhU_ceB1YB6Q |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=CARNYX%3A+A+framework+for+vulnerability+detection+via+power+consumption+analysis+in+embedded+systems&rft.jtitle=International+journal+of+information+security&rft.au=Barredo%2C+Jorge&rft.au=Eceiza%2C+Maialen&rft.au=Flores%2C+Jose+Luis&rft.au=Iturbe%2C+Mikel&rft.date=2025-08-01&rft.issn=1615-5262&rft.eissn=1615-5270&rft.volume=24&rft.issue=4&rft_id=info:doi/10.1007%2Fs10207-025-01092-2&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s10207_025_01092_2 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1615-5262&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1615-5262&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1615-5262&client=summon |