CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems

The widespread use of the Internet of Things (IoT) has led to a surge in interconnected, resource-constrained embedded systems, which are inherently vulnerable due to limited security mechanisms. This paper presents CARNYX, a framework leveraging power consumption analysis, rooted in Side-Channel An...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of information security Vol. 24; no. 4; p. 172
Main Authors Barredo, Jorge, Eceiza, Maialen, Flores, Jose Luis, Iturbe, Mikel
Format Journal Article
LanguageEnglish
Published Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2025
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The widespread use of the Internet of Things (IoT) has led to a surge in interconnected, resource-constrained embedded systems, which are inherently vulnerable due to limited security mechanisms. This paper presents CARNYX, a framework leveraging power consumption analysis, rooted in Side-Channel Analysis (SCA), to detect vulnerabilities in embedded systems with high accuracy. Designed for pre-deployment vulnerability detection, it offers three key advantages over existing SCA solutions: (1) detailed categorisation of specific vulnerability types beyond binary detection, (2) a methodology validated on the STM32F4 architecture and ARM Cortex-A8 with potential applicability to similar low- and medium-end systems, and (3) reliable detection in resource-constrained devices where power monitoring is practical. We evaluate CARNYX on three platforms: two low-end STM32F4-based platforms (Riscure Piñata and STM NUCLEO-144) and the medium-end ARM Cortex-A8-based BeagleBone Black, analysing 16 arithmetic and memory-related software flaws. Results demonstrate recall rates of 99.69% (Piñata), 86.88% (NUCLEO-144 with serial interface), 51.25% (NUCLEO-144 with Ethernet), and 53.67% (BeagleBone Black)-all with high precision-while measuring the effect of communication peripherals on side-channel leakage, an aspect underexplored in prior vulnerability detection studies. These results highlight CARNYX’s potential to enhance security in constrained IoT devices, even in noisy environments where binary detection methods offer limited value. While validated on STM32F4 and ARM Cortex-A8, its principles may extend to other low- and medium-end systems, subject to further validation.
AbstractList The widespread use of the Internet of Things (IoT) has led to a surge in interconnected, resource-constrained embedded systems, which are inherently vulnerable due to limited security mechanisms. This paper presents CARNYX, a framework leveraging power consumption analysis, rooted in Side-Channel Analysis (SCA), to detect vulnerabilities in embedded systems with high accuracy. Designed for pre-deployment vulnerability detection, it offers three key advantages over existing SCA solutions: (1) detailed categorisation of specific vulnerability types beyond binary detection, (2) a methodology validated on the STM32F4 architecture and ARM Cortex-A8 with potential applicability to similar low- and medium-end systems, and (3) reliable detection in resource-constrained devices where power monitoring is practical. We evaluate CARNYX on three platforms: two low-end STM32F4-based platforms (Riscure Piñata and STM NUCLEO-144) and the medium-end ARM Cortex-A8-based BeagleBone Black, analysing 16 arithmetic and memory-related software flaws. Results demonstrate recall rates of 99.69% (Piñata), 86.88% (NUCLEO-144 with serial interface), 51.25% (NUCLEO-144 with Ethernet), and 53.67% (BeagleBone Black)-all with high precision-while measuring the effect of communication peripherals on side-channel leakage, an aspect underexplored in prior vulnerability detection studies. These results highlight CARNYX’s potential to enhance security in constrained IoT devices, even in noisy environments where binary detection methods offer limited value. While validated on STM32F4 and ARM Cortex-A8, its principles may extend to other low- and medium-end systems, subject to further validation.
ArticleNumber 172
Author Eceiza, Maialen
Barredo, Jorge
Iturbe, Mikel
Flores, Jose Luis
Author_xml – sequence: 1
  givenname: Jorge
  orcidid: 0000-0001-5552-6825
  surname: Barredo
  fullname: Barredo, Jorge
  email: jbarredo@ikerlan.es
  organization: IKERLAN Technology Research Centre, Mondragon Unibertsitatea, IKERLAN Technology Research Centre
– sequence: 2
  givenname: Maialen
  orcidid: 0000-0001-7755-2848
  surname: Eceiza
  fullname: Eceiza, Maialen
  organization: IKERLAN Technology Research Centre, Mondragon Unibertsitatea
– sequence: 3
  givenname: Jose Luis
  orcidid: 0000-0002-5555-9712
  surname: Flores
  fullname: Flores, Jose Luis
  organization: University of the Basque Country UPV/EHU
– sequence: 4
  givenname: Mikel
  orcidid: 0000-0001-9641-5646
  surname: Iturbe
  fullname: Iturbe, Mikel
  organization: IKERLAN Technology Research Centre
BookMark eNp9kF1LwzAUhoNMcE7_gFcBr6v5aNLMuzH8gqEgCnoV0vZEOtukJt1G_711Fb3z6hwOz_tyeI7RxHkHCJ1RckEJyS4jJYxkCWEiIZTMWcIO0JRKKhLBMjL53SU7QscxrglhA0anKF8unh7eXq_wAttgGtj58IGtD3i7qR0Ek1d11fW4hA6KrvIObyuDW7-DgAvv4qZp91fjTN3HKuLKYWhyKEsocexjB008QYfW1BFOf-YMvdxcPy_vktXj7f1ysUoKTmWXACGKF6mVpRGcFuk8Z2AU5ZIxMs-sBUGzgiquLKTcgCoyYk0upREqZQqAz9D52NsG_7mB2Om134Thsag5Y4pKwYUYKDZSRfAxBrC6DVVjQq8p0d8u9ehSDy713qVmQ4iPoTjA7h3CX_U_qS-CwXlf
Cites_doi 10.1145/3316781.3323480
10.1186/s12864-019-6413-7
10.1145/3015135.3015141
10.1109/TVLSI.2023.3335876
10.1371/journal.pone.0210236
10.1007/s43926-022-00021-2
10.1109/TCE.2004.1309414
10.1109/ICDMW.2017.152
10.1007/978-0-387-38162-6
10.1186/s42400-022-00123-y
10.1109/ACCESS.2021.3119220
10.1145/1015047.1015049
10.1109/COMST.2019.2962586
10.1145/1456455.1456460
10.1145/3139937.3139938
10.1109/JIOT.2021.3078072
10.1177/0049124104268644
10.1145/3477314.3507030
10.1007/978-3-319-45931-8_9
10.14722/ndss.2014.23229
10.1007/978-3-540-85053-3_27
10.1007/BF00134682.
10.1145/313817.313834
10.1109/ACCESS.2021.3052867
10.1117/12.2311329
10.1016/j.cose.2023.103180
10.1016/0169-7439(87)80084-9
10.1145/3446997
10.1109/ISCISC.2014.6994033
10.1109/JIOT.2021.3056179
10.14722/ndss.2018.23166
10.1049/ip-smt:19990001
10.18653/v1/2022.nlppower-1.4
10.18280/rces.090205
10.1007/978-3-030-88418-5_5
10.1049/wss2.12054
10.1016/J.COMPCHEMENG.2006.09.004
10.1109/THS.2008.4534479
10.1109/IJCNN.2017.7966373
10.21105/joss.00205
10.1007/s13389-011-0023-x
10.1016/B978-1-85617-751-1.00001-X
10.3390/cryptography4040030
10.1145/3485832.3485894
10.1002/widm.30
10.1145/3320269.3384727
10.1007/978-3-642-33338-5_5
10.1007/978-981-10-7563-6_53
10.1109/TC.2019.2945767
10.1109/JIOT.2019.2935189
10.1016/j.eswa.2021.115531
10.1109/PST.2015.7232966
ContentType Journal Article
Copyright The Author(s) 2025
The Author(s) 2025. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: The Author(s) 2025
– notice: The Author(s) 2025. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID C6C
AAYXX
CITATION
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
DOI 10.1007/s10207-025-01092-2
DatabaseName Springer Nature OA Free Journals
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
ProQuest Criminal Justice (Alumni)
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
ProQuest Criminal Justice (Alumni)
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
ProQuest Criminal Justice (Alumni)
Database_xml – sequence: 1
  dbid: C6C
  name: Springer Nature OA Free Journals (WRLC)
  url: http://www.springeropen.com/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1615-5270
ExternalDocumentID 10_1007_s10207_025_01092_2
GrantInformation_xml – fundername: Basque Government
  grantid: IT1676-22
– fundername: AEI/10.13039/501100011033, FEDER and UE
  grantid: PLEC2024-011222; PLEC2024-011222; PLEC2024-011222
GroupedDBID -~C
.86
.DC
.VR
06D
0R~
0VY
1N0
203
29J
2J2
2JN
2JY
2KG
2LR
2~H
30V
4.4
406
408
409
40D
40E
5GY
5VS
67Z
6NX
7WY
8FL
8TC
8VB
95-
95.
95~
96X
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAPKM
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBRH
ABBXA
ABDBE
ABDBF
ABDZT
ABECU
ABFSG
ABFTD
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABWNU
ABXPI
ACAOD
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACSTC
ACZOJ
ADHHG
ADHIR
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEFQL
AEGNC
AEJHL
AEJRE
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AEZWR
AFBBN
AFDZB
AFHIU
AFLOW
AFOHR
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHPBZ
AHWEU
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AIXLP
AJRNO
AJZVZ
AKVCP
ALMA_UNASSIGNED_HOLDINGS
ALSLI
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARMRJ
ASPBG
ATHPR
AVWKF
AXYYD
AYFIA
AYJHY
AZFZN
B-.
BA0
BENPR
BGNMA
BSONS
C6C
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EAP
EBLON
EBR
EBS
EBU
EIOEI
ESBYG
EST
ESX
FEDTE
FERAY
FFXSO
FIGPU
FNLPD
FRRFC
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ7
GQ8
GXS
HCIFZ
HF~
HG5
HG6
HLICF
HMJXF
HQYDN
HRMNR
HVGLF
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6~
KDC
KOV
LAS
LLZTM
M0O
M4Y
MA-
NB0
NPVJJ
NQJWS
NU0
O93
O9J
P2P
P9O
PF0
PQBIZ
PT4
QOS
QWB
R89
R9I
RNS
ROL
RPX
RSV
S16
S1Z
S27
S3B
SAP
SCO
SDH
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TN5
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
ZL0
ZMTXR
~A9
-Y2
.4S
0-V
1SB
2P1
2VQ
6KP
8AO
8FE
8FG
8FW
AARHV
AAYXX
ABQSL
ABRTQ
ABULA
ABUWG
ACBXY
ACUHS
ADHKG
ADMLS
AEBTG
AEKMD
AEMOZ
AFGCZ
AFKRA
AGQPQ
AHQJS
AHSBF
AJBLW
ARALO
ARCSS
AZQEC
B0M
BDATZ
BEZIV
BGLVJ
BGRYB
BPHCQ
CAG
CCPQU
CITATION
COF
DWQXO
EAD
EBA
ECS
EDO
EIS
EJD
EMK
EPL
FIL
FINBP
FRNLG
FSGXE
GNUQQ
H13
HZ~
I-F
K1G
K6V
K7-
M0C
M1Q
N2Q
O9-
P62
PHGZM
PHGZT
PQBZA
PQGLB
PQQKQ
PROAC
PRQQA
Q2X
TH9
TUS
~8M
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
ID FETCH-LOGICAL-c316t-e0083c4f6da531c49b2ea813622097ffe517c1838fe43ae8c70fab66a58428ee3
IEDL.DBID C6C
ISSN 1615-5262
IngestDate Sat Aug 16 19:52:58 EDT 2025
Wed Jul 16 16:44:23 EDT 2025
Thu Jul 10 06:06:18 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Embedded systems
Side-channel analysis
Hardware security
Vulnerability detection
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c316t-e0083c4f6da531c49b2ea813622097ffe517c1838fe43ae8c70fab66a58428ee3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7755-2848
0000-0001-9641-5646
0000-0002-5555-9712
0000-0001-5552-6825
OpenAccessLink https://doi.org/10.1007/s10207-025-01092-2
PQID 3228165355
PQPubID 43999
ParticipantIDs proquest_journals_3228165355
crossref_primary_10_1007_s10207_025_01092_2
springer_journals_10_1007_s10207_025_01092_2
PublicationCentury 2000
PublicationDate 2025-08-01
PublicationDateYYYYMMDD 2025-08-01
PublicationDate_xml – month: 08
  year: 2025
  text: 2025-08-01
  day: 01
PublicationDecade 2020
PublicationPlace Berlin/Heidelberg
PublicationPlace_xml – name: Berlin/Heidelberg
– name: Heidelberg
PublicationTitle International journal of information security
PublicationTitleAbbrev Int. J. Inf. Secur
PublicationYear 2025
Publisher Springer Berlin Heidelberg
Springer Nature B.V
Publisher_xml – name: Springer Berlin Heidelberg
– name: Springer Nature B.V
References L Batina (1092_CR33) 2019
WA Johnson (1092_CR7) 2021
DP Pham (1092_CR45) 2021
1092_CR61
1092_CR60
W Bolton (1092_CR25) 2009
1092_CR63
1092_CR21
1092_CR6
1092_CR20
1092_CR64
1092_CR9
1092_CR23
1092_CR8
1092_CR66
1092_CR24
1092_CR26
1092_CR28
R Hegde (1092_CR53) 1999
1092_CR3
X Wang (1092_CR41) 2018
1092_CR5
M Eceiza (1092_CR27) 2021
1092_CR1
S Wold (1092_CR54) 1987
KP Burnham (1092_CR55) 2004
1092_CR30
1092_CR32
1092_CR31
1092_CR36
G Betta (1092_CR50) 1999
1092_CR35
1092_CR38
1092_CR37
VA Thakor (1092_CR34) 2021
1092_CR39
Z Abbasi (1092_CR46) 2014
G Hospodar (1092_CR16) 2011
HP Vinutha (1092_CR52) 2018
S Mangard (1092_CR51) 2007
M Tamura (1092_CR62) 2007
S Ravi (1092_CR4) 2004
Y Bai (1092_CR48) 2022
S Moore (1092_CR42) 2016
F Meneghello (1092_CR2) 2019
1092_CR40
1092_CR43
1092_CR44
P Wang (1092_CR47) 2017
B Gierlichs (1092_CR19) 2008
1092_CR49
D Kleidermacher (1092_CR11) 2008
G Ara (1092_CR22) 2022
S Picek (1092_CR14) 2017
D Couroussé (1092_CR65) 2016
J Winter (1092_CR29) 2008
1092_CR12
1092_CR56
MA Ferrag (1092_CR10) 2021
U Rioja (1092_CR15) 2021
1092_CR13
1092_CR57
HP Kriegel (1092_CR58) 2011
1092_CR59
1092_CR18
1092_CR17
References_xml – ident: 1092_CR5
– year: 2019
  ident: 1092_CR33
  publication-title: Security
  doi: 10.1145/3316781.3323480
– ident: 1092_CR61
  doi: 10.1186/s12864-019-6413-7
– year: 2016
  ident: 1092_CR42
  publication-title: Buffer overflow attack’s power consumption signatures
  doi: 10.1145/3015135.3015141
– ident: 1092_CR43
  doi: 10.1109/TVLSI.2023.3335876
– ident: 1092_CR56
  doi: 10.1371/journal.pone.0210236
– year: 2022
  ident: 1092_CR48
  publication-title: Real-time instruction-level verification of remote IoT/CPS devices via side channels
  doi: 10.1007/s43926-022-00021-2
– ident: 1092_CR26
  doi: 10.1109/TCE.2004.1309414
– year: 2017
  ident: 1092_CR47
  publication-title: Control
  doi: 10.1109/ICDMW.2017.152
– year: 2007
  ident: 1092_CR51
  publication-title: Power Analysis Attacks: Revealing the Secrets of Smart Cards
  doi: 10.1007/978-0-387-38162-6
– ident: 1092_CR13
  doi: 10.1186/s42400-022-00123-y
– ident: 1092_CR36
– ident: 1092_CR59
– year: 2021
  ident: 1092_CR7
  publication-title: A Taxonomy and Review of Remote Attestation Schemes in Embedded Systems
  doi: 10.1109/ACCESS.2021.3119220
– year: 2004
  ident: 1092_CR4
  publication-title: Security in Embedded Systems: Design Challenges
  doi: 10.1145/1015047.1015049
– ident: 1092_CR8
  doi: 10.1109/COMST.2019.2962586
– ident: 1092_CR6
– year: 2008
  ident: 1092_CR29
  publication-title: Trusted computing building blocks for embedded linux-based ARM trustzone platforms
  doi: 10.1145/1456455.1456460
– ident: 1092_CR32
– ident: 1092_CR9
  doi: 10.1145/3139937.3139938
– year: 2021
  ident: 1092_CR10
  publication-title: The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial
  doi: 10.1109/JIOT.2021.3078072
– year: 2004
  ident: 1092_CR55
  publication-title: Multimodel inference: understanding AIC and BIC in model selection
  doi: 10.1177/0049124104268644
– year: 2022
  ident: 1092_CR22
  publication-title: Simulating execution time and power consumption of real-time tasks on embedded platforms
  doi: 10.1145/3477314.3507030
– year: 2016
  ident: 1092_CR65
  publication-title: Runtime code polymorphism as a protection against side channel attacks
  doi: 10.1007/978-3-319-45931-8_9
– ident: 1092_CR12
  doi: 10.14722/ndss.2014.23229
– ident: 1092_CR63
– year: 2008
  ident: 1092_CR19
  publication-title: Mutual Information Analysis
  doi: 10.1007/978-3-540-85053-3_27
– ident: 1092_CR49
– ident: 1092_CR24
  doi: 10.1007/BF00134682.
– year: 1999
  ident: 1092_CR53
  publication-title: Energy-efficient signal processing via algorithmic noise-tolerance
  doi: 10.1145/313817.313834
– ident: 1092_CR66
– ident: 1092_CR18
– year: 2021
  ident: 1092_CR34
  publication-title: Comparison and Research Opportunities
  doi: 10.1109/ACCESS.2021.3052867
– year: 2018
  ident: 1092_CR41
  publication-title: Deep learning-based classification and anomaly detection of side-channel signals
  doi: 10.1117/12.2311329
– ident: 1092_CR35
– ident: 1092_CR30
  doi: 10.1016/j.cose.2023.103180
– year: 1987
  ident: 1092_CR54
  publication-title: Principal component analysis
  doi: 10.1016/0169-7439(87)80084-9
– year: 2021
  ident: 1092_CR15
  publication-title: The Uncertainty of Side-Channel Analysis: A Way to Leverage from Heuristics
  doi: 10.1145/3446997
– year: 2014
  ident: 1092_CR46
  publication-title: Anomaly detection in embedded systems using simultaneous power and temperature monitoring
  doi: 10.1109/ISCISC.2014.6994033
– year: 2021
  ident: 1092_CR27
  publication-title: Fuzzing the Internet of Things: A Review on the Techniques and Challenges for Efficient Vulnerability Discovery in Embedded Systems
  doi: 10.1109/JIOT.2021.3056179
– ident: 1092_CR28
  doi: 10.14722/ndss.2018.23166
– year: 1999
  ident: 1092_CR50
  publication-title: Structured approach to estimate the measurement uncertainty in digital signal elaboration algorithms
  doi: 10.1049/ip-smt:19990001
– ident: 1092_CR60
  doi: 10.18653/v1/2022.nlppower-1.4
– ident: 1092_CR1
  doi: 10.18280/rces.090205
– ident: 1092_CR64
– ident: 1092_CR17
  doi: 10.1007/978-3-030-88418-5_5
– ident: 1092_CR21
  doi: 10.1049/wss2.12054
– year: 2007
  ident: 1092_CR62
  publication-title: A study on the number of principal components and sensitivity of fault detection using PCA
  doi: 10.1016/J.COMPCHEMENG.2006.09.004
– year: 2008
  ident: 1092_CR11
  publication-title: Integrating Static Analysis into a Secure Software Development Process
  doi: 10.1109/THS.2008.4534479
– year: 2017
  ident: 1092_CR14
  publication-title: Side-channel analysis and machine learning: A practical perspective
  doi: 10.1109/IJCNN.2017.7966373
– ident: 1092_CR38
– ident: 1092_CR3
– ident: 1092_CR57
  doi: 10.21105/joss.00205
– year: 2011
  ident: 1092_CR16
  publication-title: Machine learning in side-channel analysis: A first study
  doi: 10.1007/s13389-011-0023-x
– year: 2009
  ident: 1092_CR25
  publication-title: Programmable Logic Controllers
  doi: 10.1016/B978-1-85617-751-1.00001-X
– ident: 1092_CR40
  doi: 10.3390/cryptography4040030
– year: 2021
  ident: 1092_CR45
  publication-title: Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification
  doi: 10.1145/3485832.3485894
– year: 2011
  ident: 1092_CR58
  publication-title: Density-based clustering
  doi: 10.1002/widm.30
– ident: 1092_CR44
  doi: 10.1145/3320269.3384727
– ident: 1092_CR31
  doi: 10.1007/978-3-642-33338-5_5
– year: 2018
  ident: 1092_CR52
  publication-title: Detection of Outliers Using Interquartile Range Technique from Intrusion Dataset
  doi: 10.1007/978-981-10-7563-6_53
– ident: 1092_CR20
  doi: 10.1109/TC.2019.2945767
– year: 2019
  ident: 1092_CR2
  publication-title: A Survey of Practical Security Vulnerabilities in Real IoT Devices
  doi: 10.1109/JIOT.2019.2935189
– ident: 1092_CR23
  doi: 10.1016/j.eswa.2021.115531
– ident: 1092_CR39
  doi: 10.1109/PST.2015.7232966
– ident: 1092_CR37
SSID ssj0021091
Score 2.3648968
Snippet The widespread use of the Internet of Things (IoT) has led to a surge in interconnected, resource-constrained embedded systems, which are inherently vulnerable...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Index Database
Publisher
StartPage 172
SubjectTerms Access control
Automation
Coding and Information Theory
Communications Engineering
Computer Communication Networks
Computer Science
Constraints
Cryptology
Cybersecurity
Embedded systems
Ethernet
Internet of Things
Management of Computing and Information Systems
Networks
Operating Systems
Power consumption
Power management
Regular Contribution
Serial interfaces
Software
Software reliability
Taxonomy
Subtitle CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems
Title CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems
URI https://link.springer.com/article/10.1007/s10207-025-01092-2
https://www.proquest.com/docview/3228165355
Volume 24
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF7EXrz4Fqu17MGbBpJN9lFvaWgtij2IhfYUNptZKGgs9gH-e2fTxGLRg5fkkLCHbzMz32RnviHkGgLpy5yDl4U5JigssJ5WwD2eG-ZnkbCRcY3CT0MxGEUPYz6uZHJcL8zW-b1rcWPuZxpzJWZ-h3nobhs8CKUb05CI5Du5cgKXLrnCCI3JlWBVg8zva_wMQhtmuXUYWsaY_iHZr8ghjde7eUR2oDgmB_XgBVrZ4QnJkvh5OBnf0ZjauriKIvukq-WrU5EuC14_aQ6LstCqoKuppjM3D42asuWy9BNUV4IkdFpQeMsAfVBO19LO81My6vdekoFXDUvwTBiIhQeOTJnIilyjWZmokzHQKsD4xPyOtBZ4IA3ar7IQhRqUkb7VmRAaGQhTAOEZ2S3eCzgnVAlfGctDbRVgfEc3pDBT0zmTCgmX5E1yU6OXztaaGOlG_dhhnSLWaYl1ypqkVQOcVvYxT9GNqEBwJDtNcluDvnn892oX_3v9kuyxct9dxV6L7C4-lnCFLGKRtUkj7ne7Q3e_nzz22uXnhNcRi78ATRzAtg
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwEB1BOcCFHVFWH-AEkRIncVwkDhWLytYDolI5BccZS0gQEC2g_g8fythNKCA4cOCcyLJexs9v4jdjgC0MEj_JY_SyMKcEhQfGUxJjL84197NImEjbQuGLtmh1otNu3B2Dt6oWxrndqyNJx9Sfit24_a3GrdnMb3CPl1bKMxy8UqLW2z85pK-6zfnx0dVByyvvEvB0GIi-h1Zr6MiIXFHU6aiRcVQyIPrmfiMxBuMg0RTe0mAUKpQ68Y3KhFC0QXOJGNK44zBB4kPatdPhzY-0zrbWtGkdaQNK6wQvS3N-nvPX7W-kab8dw7rd7XgWpktZyprDOJqDMSzmYaa68oGVDLAA2UHzsn3d3WNNZipbFyPdy16e72z_ame1HbAc-87iVbCXW8Ue7U1sTLtiT8dQTJWtUNhtwfA-Q2K_nA2bSvcWofMv0C5BrXgocBmYFL7UJg6VkUjKgghQUo6ocp5IknpJXIedCr30cdiNIx31XbZYp4R16rBOeR3WKoDTcmX2UiIwGYiYZFYddivQR49_H23lb69vwmTr6uI8PT9pn63CFHcxYH2Da1DrPz3jOmmZfrbhQonBzX_H7jvzWf20
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3BbtNAEB2lQUK9AIVWDYR2D3CiVuy1vd5U4hAljRICEUKNlJ7c9XpWqtSaiDhB-Ss-sbMbmwCCA4eeba2s8Xj2Pe-bNwBvMEj8JI_Ry8KcCAoPjKckxl6ca-5nkTCRto3Cn6ZiNIs-zON5A37UvTBO7V4fSW57GqxLU1F2Frnp_NL4xu0vNm6FZ36Xe7ySVU5w851I2_L9eEBv-C3nw4vL_sir5gp4OgxE6aHFHToyIleUgTrqZhyVDKiUc7-bGINxkGhKdWkwChVKnfhGZUIo2qy5RAxp3T14RMwosHSvL_o_KZ612bQUj3ACUTzBqzadvz_z71vhDt_-cSTrdrrhM3hSQVTW2-bUATSweA5P6_EPrKoGLyDr975Mr-bnrMdMLfFihIHZenVrvayd7HbDciyd3Ktg6xvFFnYqG9Ou8dNVK6YqWxR2UzC8y5AqYc62BtPLQ5g9SGiPoFl8LfAYmBS-1CYOlZFIKIOKoSS-qHKeSIJ9SdyCd3X00sXWmSPdeTDbWKcU69TFOuUtaNcBTquvdJlSMZOBiAlyteCsDvru8r9Xe_l_t5_C48-DYfpxPJ28gn3uUsBKCNvQLL-t8DXBmjI7cZnE4PqhU_ceB1YB6Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=CARNYX%3A+A+framework+for+vulnerability+detection+via+power+consumption+analysis+in+embedded+systems&rft.jtitle=International+journal+of+information+security&rft.au=Barredo%2C+Jorge&rft.au=Eceiza%2C+Maialen&rft.au=Flores%2C+Jose+Luis&rft.au=Iturbe%2C+Mikel&rft.date=2025-08-01&rft.issn=1615-5262&rft.eissn=1615-5270&rft.volume=24&rft.issue=4&rft_id=info:doi/10.1007%2Fs10207-025-01092-2&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s10207_025_01092_2
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1615-5262&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1615-5262&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1615-5262&client=summon