Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study

Lijun Jiang, Weizhi Meng, Michael Yu Wang, Chunhua Su, Jin-xuan Li

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

With the increasing demand of smartphone charging, more and more public charging stations are under construction (e.g., airports, subways, shops). This scenario may expose a good chance for cybercriminals to launch charging attacks and steal user’s private information. Juice filming charging (JFC) attack is one example, which can steal users’ sensitive information from both Android OS and iOS devices, through automatically recording phone-screen information and the user inputs during the charging process. The rationale is that users’ information can be leaked through a standard micro USB connector that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential damage of charging attack, we focus on JFC attack in this paper, and investigate for the first time the energy consumption, especially CPU usage caused by JFC attack. In particular, we conduct a user study with over 500 participants and identify that JFC attack may increase CPU usage when connecting the phone to the malicious charger, but this anomaly is hard for raising the attention from a common user. Our work aims to complement existing state-of-the-art results, raise more attention and stimulate more research on charging attacks.
Original languageEnglish
Title of host publicationNetwork and System Security 2017
Volume10394
PublisherSpringer
Publication date2017
Pages199-213
ISBN (Print)9783319647005
DOIs
Publication statusPublished - 2017
Event11th International Conference on Network and System Security - Crowne Plaza hotel, Helsinki, Finland
Duration: 21 Aug 201723 Aug 2017

Conference

Conference11th International Conference on Network and System Security
LocationCrowne Plaza hotel
CountryFinland
CityHelsinki
Period21/08/201723/08/2017
SeriesLecture Notes in Computer Science
Volume10394
ISSN0302-9743

Keywords

  • Computer Science
  • Systems and Data Security
  • Computer Communication Networks
  • Data Encryption
  • Management of Computing and Information Systems
  • Software Engineering
  • Information Systems Applications (incl. Internet)
  • Emerging threats
  • Mobile privacy and security
  • User study
  • Android and iOS
  • Juice filming charging attack
  • USB cable

Cite this

Jiang, L., Meng, W., Wang, M. Y., Su, C., & Li, J. (2017). Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. In Network and System Security 2017 (Vol. 10394, pp. 199-213). Springer. Lecture Notes in Computer Science, Vol.. 10394 https://doi.org/10.1007/978-3-319-64701-2_15
Jiang, Lijun ; Meng, Weizhi ; Wang, Michael Yu ; Su, Chunhua ; Li, Jin-xuan. / Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. Network and System Security 2017. Vol. 10394 Springer, 2017. pp. 199-213 (Lecture Notes in Computer Science, Vol. 10394).
@inproceedings{cb033d68759541428a6d6b539ee356f7,
title = "Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study",
abstract = "With the increasing demand of smartphone charging, more and more public charging stations are under construction (e.g., airports, subways, shops). This scenario may expose a good chance for cybercriminals to launch charging attacks and steal user’s private information. Juice filming charging (JFC) attack is one example, which can steal users’ sensitive information from both Android OS and iOS devices, through automatically recording phone-screen information and the user inputs during the charging process. The rationale is that users’ information can be leaked through a standard micro USB connector that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential damage of charging attack, we focus on JFC attack in this paper, and investigate for the first time the energy consumption, especially CPU usage caused by JFC attack. In particular, we conduct a user study with over 500 participants and identify that JFC attack may increase CPU usage when connecting the phone to the malicious charger, but this anomaly is hard for raising the attention from a common user. Our work aims to complement existing state-of-the-art results, raise more attention and stimulate more research on charging attacks.",
keywords = "Computer Science, Systems and Data Security, Computer Communication Networks, Data Encryption, Management of Computing and Information Systems, Software Engineering, Information Systems Applications (incl. Internet), Emerging threats, Mobile privacy and security, User study, Android and iOS, Juice filming charging attack, USB cable",
author = "Lijun Jiang and Weizhi Meng and Wang, {Michael Yu} and Chunhua Su and Jin-xuan Li",
year = "2017",
doi = "10.1007/978-3-319-64701-2_15",
language = "English",
isbn = "9783319647005",
volume = "10394",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "199--213",
booktitle = "Network and System Security 2017",

}

Jiang, L, Meng, W, Wang, MY, Su, C & Li, J 2017, Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. in Network and System Security 2017. vol. 10394, Springer, Lecture Notes in Computer Science, vol. 10394, pp. 199-213, 11th International Conference on Network and System Security , Helsinki, Finland, 21/08/2017. https://doi.org/10.1007/978-3-319-64701-2_15

Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. / Jiang, Lijun; Meng, Weizhi; Wang, Michael Yu; Su, Chunhua; Li, Jin-xuan.

Network and System Security 2017. Vol. 10394 Springer, 2017. p. 199-213 (Lecture Notes in Computer Science, Vol. 10394).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

TY - GEN

T1 - Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study

AU - Jiang, Lijun

AU - Meng, Weizhi

AU - Wang, Michael Yu

AU - Su, Chunhua

AU - Li, Jin-xuan

PY - 2017

Y1 - 2017

N2 - With the increasing demand of smartphone charging, more and more public charging stations are under construction (e.g., airports, subways, shops). This scenario may expose a good chance for cybercriminals to launch charging attacks and steal user’s private information. Juice filming charging (JFC) attack is one example, which can steal users’ sensitive information from both Android OS and iOS devices, through automatically recording phone-screen information and the user inputs during the charging process. The rationale is that users’ information can be leaked through a standard micro USB connector that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential damage of charging attack, we focus on JFC attack in this paper, and investigate for the first time the energy consumption, especially CPU usage caused by JFC attack. In particular, we conduct a user study with over 500 participants and identify that JFC attack may increase CPU usage when connecting the phone to the malicious charger, but this anomaly is hard for raising the attention from a common user. Our work aims to complement existing state-of-the-art results, raise more attention and stimulate more research on charging attacks.

AB - With the increasing demand of smartphone charging, more and more public charging stations are under construction (e.g., airports, subways, shops). This scenario may expose a good chance for cybercriminals to launch charging attacks and steal user’s private information. Juice filming charging (JFC) attack is one example, which can steal users’ sensitive information from both Android OS and iOS devices, through automatically recording phone-screen information and the user inputs during the charging process. The rationale is that users’ information can be leaked through a standard micro USB connector that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential damage of charging attack, we focus on JFC attack in this paper, and investigate for the first time the energy consumption, especially CPU usage caused by JFC attack. In particular, we conduct a user study with over 500 participants and identify that JFC attack may increase CPU usage when connecting the phone to the malicious charger, but this anomaly is hard for raising the attention from a common user. Our work aims to complement existing state-of-the-art results, raise more attention and stimulate more research on charging attacks.

KW - Computer Science

KW - Systems and Data Security

KW - Computer Communication Networks

KW - Data Encryption

KW - Management of Computing and Information Systems

KW - Software Engineering

KW - Information Systems Applications (incl. Internet)

KW - Emerging threats

KW - Mobile privacy and security

KW - User study

KW - Android and iOS

KW - Juice filming charging attack

KW - USB cable

U2 - 10.1007/978-3-319-64701-2_15

DO - 10.1007/978-3-319-64701-2_15

M3 - Article in proceedings

SN - 9783319647005

VL - 10394

T3 - Lecture Notes in Computer Science

SP - 199

EP - 213

BT - Network and System Security 2017

PB - Springer

ER -

Jiang L, Meng W, Wang MY, Su C, Li J. Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. In Network and System Security 2017. Vol. 10394. Springer. 2017. p. 199-213. (Lecture Notes in Computer Science, Vol. 10394). https://doi.org/10.1007/978-3-319-64701-2_15