Wireless Charging Power Side-Channel Attacks

@article{Cour2021WirelessCP,
  title={Wireless Charging Power Side-Channel Attacks},
  author={Alexander La Cour and Khurram K. Afridi and G. Edward Suh},
  journal={Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security},
  year={2021}
}
This paper demonstrates that today's wireless charging interface is vulnerable to power side-channel attacks; a smartphone that charges wirelessly leaks information about its activity to the wireless charger transmitter. We present a website fingerprinting attack and other preliminary attacks through the wireless charging side channel on iOS and Android devices. The website fingerprinting attack monitors the current draw of a wireless charger while the smartphone it charges loads a website from… Expand

References

SHOWING 1-10 OF 55 REFERENCES
On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel
TLDR
This paper is unique, because it is the first to study this side-channel on smartphones, under smartphone-specific constraints, and demonstrates that Websites can be correctly identified within a short time span of $2\times6$ seconds, which is in contrast with prior work, which uses 15-s traces. Expand
A Study on Power Side Channels on Mobile Devices
TLDR
This paper demonstrates the existence of various power side channels on popular mobile devices such as smartphones, and presents a list of real-world attacks that can be initiated to identify running apps, infer sensitive UIs, guess password lengths, and estimate geo-locations based on unprivileged power consumption traces. Expand
Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage
TLDR
A portable, low cost power trace collection system for the side-channel construction of Charger-Surfing, which is thoroughly evaluated on various smartphones running Android or iOS, equipped with the two most commonly used screen technologies. Expand
No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices
TLDR
The presence of such stations is already prominent around public areas such as hotels, shopping malls, airports, gyms and museums, and is expected to significantly grow in the future, but there is no guarantee that the charging station is not maliciously controlled by an adversary, with the intention to exfiltrate data from the devices that are connected to it. Expand
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
TLDR
This paper proposes a new categorization system for side-channel attacks, necessary as side- channel attacks have evolved significantly since their scientific investigations during the smart card era in the 1990s, and facilitates the development of novel countermeasures. Expand
Website Fingerprinting by Power Estimation Based Side-Channel Attacks on Android 7
  • Yi Qin, Chuan Yue
  • Computer Science
  • 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
  • 2018
TLDR
Results show that website fingerprinting can be performed with high accuracy using power estimation data on Android 7.0, and a power estimation based side-channel attack to perform website fingerprinted is designed. Expand
Current Events: Identifying Webpages by Tapping the Electrical Outlet
TLDR
This work constructs a classifier that correctly identifies unlabeled power traces of webpage activity from a set of 51 candidates with 99% precision and 99% recall, and identifies the AC power side channel that leaks private information about web browsing to an observer taking measurements at the power outlet. Expand
Leveraging Side-Channel Information for Disassembly and Security
TLDR
A taxonomy of hardware-based monitoring techniques against different cyber and hardware attacks is provided, the potentials and unique challenges are highlighted, and how power-based side-channel instruction-level monitoring can offer suitable solutions to prevailing embedded device security issues are displayed. Expand
Power to peep-all: Inference Attacks by Malicious Batteries on Mobile Devices
TLDR
This work shows the feasibility of the malicious battery and motivates further research into system and application-level defenses to fully mitigate this emerging threat. Expand
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting
TLDR
A new source of side-channel leakage for aggregate CPU usage and power consumption traces on smartphones, based on the fact that electromagnetic activity caused by mobile processors leads to noticeable disturbances in magnetic sensor measurements on mobile devices, with the amplitude being proportional to the CPU workload. Expand
...
1
2
3
4
5
...