“…This means that the device must be trained per device before use. Similarly, [48][49][50][51] performed power analysis on smartphones, comparing power usage of both compromised and normal device states. While they were able to find if a device was compromised, they concluded a high degree of accuracy was required to do so.…”