The document discusses usage pattern based security attacks for smart devices. It introduces a novel malware called the "Malicious Power Monitor" that uses a device's usage patterns and a command and control server to stealthily perform attacks. The malware can launch resource intensive tasks to drain a device's battery and data limits, leak private information through SMS monitoring, and keep display settings at maximum levels to waste energy. Potential countermeasures discussed include dynamic analysis and anomaly detection techniques, but detecting such malware remains an open research problem.