Wireless Charging Power Side-Channel Attacks

05/26/2021
by   Alexander S. La Cour, et al.
0

This paper shows that today's wireless charging interface is vulnerable to power side-channel attacks; a smartphone charging wirelessly leaks private information about its activity to the wireless charger (charging transmitter). We present a website fingerprinting attack through the wireless charging side-channel for both iOS and Android devices. The attack monitors the current drawn by the wireless charging transmitter while 20 webpages from the Alexa top sites list are loaded on a charging smartphone. We implement a classifier that correctly identifies unlabeled current traces with an accuracy of 87 average for an iPhone 11 and 95 represents a considerable security threat because wireless charging does not require any user permission if the phone is within the range of a charging transmitter. To the best of our knowledge, this work represents the first to introduce and demonstrate a power side-channel attack through wireless charging. Additionally, this study compares the wireless charging side-channel with the wired USB charging power side-channel, showing that they are comparable. We find that the performance of the attack deteriorates as the contents of websites change over time. Furthermore, we discover that the amount of information leakage through both wireless and wired charging interfaces heavily depends on the battery level; minimal information is leaked at low battery levels.

READ FULL TEXT

page 2

page 5

page 9

research
02/05/2020

Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels

We consider a wireless communication system that consists of a transmitt...
research
01/14/2019

Peel the onion: Recognition of Android apps behind the Tor Network

In this work we show that Tor is vulnerable to app deanonymization attac...
research
02/05/2022

GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line

Inaudible voice command injection is one of the most threatening attacks...
research
11/13/2022

Wireless Power Transfer Analysis using Ansys

In this report, methods of wireless power transfer of inside a cage is c...
research
05/31/2019

IoT Network Security from the Perspective of Adversarial Deep Learning

Machine learning finds rich applications in Internet of Things (IoT) net...
research
08/02/2023

A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards

With recent developments in deep learning, the ubiquity of micro-phones ...
research
12/06/2019

A Game-Theoretic and Experimental Analysis of Energy-Depleting Underwater Jamming Attacks

Security aspects in underwater wireless networks have not been widely in...

Please sign up or login with your details

Forgot password? Click here to reset