作者: Alexander S. La Cour , G. Edward Suh , Khurram K. Afridi
DOI:
关键词:
摘要: This paper shows that today's wireless charging interface is vulnerable to power side-channel attacks; a smartphone wirelessly leaks private information about its activity the charger (charging transmitter). We present website fingerprinting attack through for both iOS and Android devices. The monitors current drawn by transmitter while 20 webpages from Alexa top sites list are loaded on smartphone. implement classifier correctly identifies unlabeled traces with an accuracy of 87% average iPhone 11 95% Google Pixel 4. represents considerable security threat because does not require any user permission if phone within range transmitter. To best our knowledge, this work first introduce demonstrate charging. Additionally, study compares wired USB side-channel, showing they comparable. find performance deteriorates as contents websites change over time. Furthermore, we discover amount leakage interfaces heavily depends battery level; minimal leaked at low levels.