No Free Wireless Charge: Covert Channels via Wireless Charging on Mobile Devices

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

Manufacturers and users have embraced the shift from wired to wireless technologies—a shift that promises convenience, reduced cabling, and modernization. Manufacturers cut costs by cutting down on wiring; meanwhile, users experience increased accessibility and mobility on their wireless devices. Naturally, wireless media does not come with wires, but it does come with strings attached. In a wireless world, when device A talks to device B, communication is no longer physically constrained to the two of them. Instead, the communication channel is shared by many devices, opening up avenues for eavesdropping and interception.

Wireless charging, which has become de facto functionality on many types of smart devices, is not immune to this phenomenon. Qi, the leading standard in this domain, provides a communication protocol that is unencrypted and insecure. In fact, the Qi standard enables several new means of wireless charging attack. In this paper, we propose three novel attacks on wireless charging stations, named LeakyCharge, SneakyCharge and CheatyCharge. Two are supply chain attacks, while the third would allow an adversary to perform random attacks.
Original languageEnglish
Title of host publicationProceedings of the 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
PublisherIEEE
Publication date2023
Pages137-141
ISBN (Print) 979-8-3503-2545-4
DOIs
Publication statusPublished - 2023
Event2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Porto, Portugal
Duration: 27 Jun 202330 Jun 2023

Conference

Conference2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Country/TerritoryPortugal
CityPorto
Period27/06/202330/06/2023

Keywords

  • Wireless Charge
  • Phone security
  • Covert Channel
  • Charging Attack
  • Qi Protocol

Fingerprint

Dive into the research topics of 'No Free Wireless Charge: Covert Channels via Wireless Charging on Mobile Devices'. Together they form a unique fingerprint.

Cite this