The CTF scenarios in Dragon_Pi illustrate the effectiveness of inspecting the power consumption of a device to detect unexpected code and commands, which could indicate an APT actor using an IoT device for nefarious purposes. 6. Limitations of the Work As Dragon_Pi is our first step into ...