Investigating the Security of EV Charging Mobile Applications As an Attack Surface

11/19/2022
by   K. Sarieddine, et al.
0

The adoption rate of EVs has witnessed a significant increase in recent years driven by multiple factors, chief among which is the increased flexibility and ease of access to charging infrastructure. To improve user experience, increase system flexibility and commercialize the charging process, mobile applications have been incorporated into the EV charging ecosystem. EV charging mobile applications allow consumers to remotely trigger actions on charging stations and use functionalities such as start/stop charging sessions, pay for usage, and locate charging stations, to name a few. In this paper, we study the security posture of the EV charging ecosystem against remote attacks, which exploit the insecurity of the EV charging mobile applications as an attack surface. We leverage a combination of static and dynamic analysis techniques to analyze the security of widely used EV charging mobile applications. Our analysis of 31 widely used mobile applications and their interactions with various components such as the cloud management systems indicate the lack of user/vehicle verification and improper authorization for critical functions, which lead to remote (dis)charging session hijacking and Denial of Service (DoS) attacks against the EV charging station. Indeed, we discuss specific remote attack scenarios and their impact on the EV users. More importantly, our analysis results demonstrate the feasibility of leveraging existing vulnerabilities across various EV charging mobile applications to perform wide-scale coordinated remote charging/discharging attacks against the connected critical infrastructure (e.g., power grid), with significant undesired economical and operational implications. Finally, we propose counter measures to secure the infrastructure and impede adversaries from performing reconnaissance and launching remote attacks using compromised accounts.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/24/2019

Security Analysis of Near-Field Communication (NFC) Payments

Near-Field Communication (NFC) is a modern technology for short range co...
research
11/14/2019

A Security Perspective on Unikernels

Cloud-based infrastructures have grown in popularity over the last decad...
research
11/08/2018

Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps

Smart home connects tens of home devices into the Internet, running a sm...
research
02/20/2023

Programmable System Call Security with eBPF

System call filtering is a widely used security mechanism for protecting...
research
10/16/2021

Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services

Mobile crowdsourcing services (MCS), enable fast and economical data acq...
research
11/12/2020

Analysing the fall 2020 Emotet campaign

In this report, we analyse the latest campaign of Emotet that had a sign...
research
06/28/2023

A Diamond Model Analysis on Twitter's Biggest Hack

Cyberattacks have prominently increased over the past few years now, and...

Please sign up or login with your details

Forgot password? Click here to reset