Wireless Charging Power Side-Channel Attacks.

作者: Alexander S. La Cour , G. Edward Suh , Khurram K. Afridi

DOI:

关键词:

摘要: This paper shows that today's wireless charging interface is vulnerable to power side-channel attacks; a smartphone wirelessly leaks private information about its activity the charger (charging transmitter). We present website fingerprinting attack through for both iOS and Android devices. The monitors current drawn by transmitter while 20 webpages from Alexa top sites list are loaded on smartphone. implement classifier correctly identifies unlabeled traces with an accuracy of 87% average iPhone 11 95% Google Pixel 4. represents considerable security threat because does not require any user permission if phone within range transmitter. To best our knowledge, this work first introduce demonstrate charging. Additionally, study compares wired USB side-channel, showing they comparable. find performance deteriorates as contents websites change over time. Furthermore, we discover amount leakage interfaces heavily depends battery level; minimal leaked at low levels.

参考文章(25)
Shane S. Clark, Hossen Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu, Wenyuan Xu, Current events: Identifying webpages by tapping the electrical outlet european symposium on research in computer security. pp. 700- 717 ,(2013) , 10.1007/978-3-642-40203-6_39
Liming Lu, Ee-Chien Chang, Mun Choon Chan, Website fingerprinting and identification using ordered feature sequences european symposium on research in computer security. pp. 199- 214 ,(2010) , 10.1007/978-3-642-15497-3_13
Tara N. Sainath, Oriol Vinyals, Andrew Senior, Hasim Sak, Convolutional, Long Short-Term Memory, fully connected Deep Neural Networks international conference on acoustics, speech, and signal processing. pp. 4580- 4584 ,(2015) , 10.1109/ICASSP.2015.7178838
Thomas Popp, Stefan Mangard, Elisabeth Oswald, Power Analysis Attacks and Countermeasures IEEE Design & Test of Computers. ,vol. 24, pp. 535- 543 ,(2007) , 10.1109/MDT.2007.200
Jacob Sorber, Benjamin Ransford, Kevin Fu, Amir Rahmati, Shane S. Clark, Wenyuan Xu, Shane Guineau, WattsUpDoc: power side channels to nonintrusively discover untargeted malware on embedded medical devices HealthTech'13 Proceedings of the 2013 USENIX conference on Safety, Security, Privacy and Interoperability of Health Information Technologies. pp. 9- 9 ,(2013)
Paul Kocher, Joshua Jaffe, Benjamin Jun, Differential Power Analysis international cryptology conference. ,vol. 1666, pp. 388- 397 ,(1999) , 10.1007/3-540-48405-1_25
Qing Yang, Paolo Gasti, Gang Zhou, Aydin Farajidavar, Kiran S. Balagani, On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel IEEE Transactions on Information Forensics and Security. ,vol. 12, pp. 1056- 1066 ,(2017) , 10.1109/TIFS.2016.2639446
Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, Stefan Mangard, Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices IEEE Communications Surveys and Tutorials. ,vol. 20, pp. 465- 488 ,(2018) , 10.1109/COMST.2017.2779824
Abien Fred Agarap, Deep Learning using Rectified Linear Units (ReLU) arXiv: Neural and Evolutionary Computing. ,(2018)
Li Yang, Teng Wei, Jianfeng Ma, Shui Yu, Chao Yang, Inference Attack in Android Activity based on Program Fingerprint communications and networking symposium. pp. 1- 9 ,(2018) , 10.1109/CNS.2018.8433169