Hacking a Wireless Phone Charging Station

Wednesday, April 19, 2017 @ 02:04 PM gHale


Risks associated with charging a smartphone using a USB cord that can also transfer data are well known, but hackers could use a side channel to learn what websites a user has visited while charging a device.

Researchers said “a malicious charging station” can use seemingly unrelated data like a device’s power consumption to extract sensitive information.

RELATED STORIES
Making Power Grid Smarter
Gaining Control over Soft Robots
Light Sources can Hijack Scanner
Speeding Up Testing of Networking Protocols

In crowded areas like airports, most people will search for a plug to charge their phones into, putting their phones at risk of “juice-jacking,” when a compromised outlet steals data through a USB data cable.

The research looked at data theft through charging alone and was conducted at New York Institute of Technology (NYIT) by Kiran Balagani (assistant professor, NYIT), Aydin Farajidavar (assistant professor, NYIT), Paolo Gasti (assistant professor, NYIT), Qing Yang (Ph.D. student, College of William and Mary), and Gang Zhou (associate professor, College of William and Mary); their work is the first to show that even without a data cable, hackers can analyze a device’s power needs to get at users’ private information, with speed and accuracy depending on a number of factors.

Gasti said the side-channel attacks were successful because “webpages have a signature that reflects the way they load and consume energy.” The remaining power traces act as “signatures” and help hackers discover which sites have been visited.

The researchers conducted the study using power use signatures they had previously identified and tested the attack under various conditions.

After collecting power traces via a range of smartphones browsing popular websites, researchers launched attacks and checked the accuracy with which their algorithms could determine which websites were visited while the phones were plugged in.

Various factors such as battery charging level, browser cache enabled/disabled, taps on the screen, and Wi-Fi/LTE influenced the accuracy rate in tracing websites visited; some conditions, such as a fully charged battery, facilitate a fast and accurate penetration, while others, such as tapping the screen while a page is loading, lessen hackers’ ability to determine what website is being viewed.

Regardless of the conditions, the important finding emerging from this work is that such an attack can indeed be carried out successfully. And in this study, the slower, less accurate attempts at penetration were still accurate within six seconds about half the time.

“Although this was an early study of power use signatures, it’s very likely that information besides browsing activity can also be stolen via this side channel,” Gasti said explaining the significance of the research. “Since public USB charging stations are so widely used, people need to be aware that there might be security issues with them. For example, informed users might choose not to browse the web while charging.”



Leave a Reply

You must be logged in to post a comment.