This paper shows that today's wireless charging interface is vulnerable to power side-channel attacks; a smartphone charging wirelessly leaks private information about its activity to the wireless charger (charging transmitter). We present a website fingerprinting attack through the wireless charging side-channel for both iOS and Android devices. The attack monitors the current drawn by the wireless charging transmitter while 20 webpages from the Alexa top sites list are loaded on a charging smartphone. We implement a classifier that correctly identifies unlabeled current traces with an accuracy of 87% on average for an iPhone 11 and 95% on average for a Google Pixel 4. This represents a considerable security threat because wireless charging does not require any user permission if the phone is within the range of a charging transmitter. To the best of our knowledge, this work represents the first to introduce and demonstrate a power side-channel attack through wireless charging. Additionally, this study compares the wireless charging side-channel with the wired USB charging power side-channel, showing that they are comparable. We find that the performance of the attack deteriorates as the contents of websites change over time. Furthermore, we discover that the amount of information leakage through both wireless and wired charging interfaces heavily depends on the battery level; minimal information is leaked at low battery levels.
翻译:本文显示, 今天的无线充电界面很容易受到电源侧声道攻击; 一个智能手机无线充电, 向无线充电器( 充电发射机) 泄漏有关其活动的私人信息。 我们通过无线充电侧声道为iOS 和 Android 设备提供网站指纹攻击。 攻击监测无线充电发射机所抽取的电流, 而Alexa 顶端网站列表的20个网页则装在充电智能手机上。 我们实施了一个分类器, 正确识别未贴贴标签的当前微粒, 其iPhone 11和 95 平均准确度为 87%, Google Pixel 4 平均为 iPhone 11 和 95% 95 。 这代表了巨大的安全威胁, 因为无线充电并不需要用户许可, 如果手机在充电发射机范围之内, 则无需用户许可。 据我们所知, 这项工作代表着第一个引入并展示电源侧声道攻击侧声道攻击。 此外, 将无线侧声道侧声道侧声道与有最低程度的电路段。