Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study

Lijun Jiang, Weizhi Meng, Michael Yu Wang, Chunhua Su, Jin-xuan Li

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review


With the increasing demand of smartphone charging, more and more public charging stations are under construction (e.g., airports, subways, shops). This scenario may expose a good chance for cybercriminals to launch charging attacks and steal user’s private information. Juice filming charging (JFC) attack is one example, which can steal users’ sensitive information from both Android OS and iOS devices, through automatically recording phone-screen information and the user inputs during the charging process. The rationale is that users’ information can be leaked through a standard micro USB connector that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential damage of charging attack, we focus on JFC attack in this paper, and investigate for the first time the energy consumption, especially CPU usage caused by JFC attack. In particular, we conduct a user study with over 500 participants and identify that JFC attack may increase CPU usage when connecting the phone to the malicious charger, but this anomaly is hard for raising the attention from a common user. Our work aims to complement existing state-of-the-art results, raise more attention and stimulate more research on charging attacks.
Original languageEnglish
Title of host publicationNetwork and System Security 2017
Publication date2017
ISBN (Print)9783319647005
Publication statusPublished - 2017
Event11th International Conference on Network and System Security - Crowne Plaza hotel, Helsinki, Finland
Duration: 21 Aug 201723 Aug 2017


Conference11th International Conference on Network and System Security
LocationCrowne Plaza hotel
SeriesLecture Notes in Computer Science


  • Computer Science
  • Systems and Data Security
  • Computer Communication Networks
  • Data Encryption
  • Management of Computing and Information Systems
  • Software Engineering
  • Information Systems Applications (incl. Internet)
  • Emerging threats
  • Mobile privacy and security
  • User study
  • Android and iOS
  • Juice filming charging attack
  • USB cable

Fingerprint Dive into the research topics of 'Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study'. Together they form a unique fingerprint.

Cite this