The adoption rate of EVs has witnessed a significant increase in recent years driven by multiple factors, chief among which is the increased flexibility and ease of access to charging infrastructure. To improve user experience, increase system flexibility and commercialize the charging process, mobile applications have been incorporated into the EV charging ecosystem. EV charging mobile applications allow consumers to remotely trigger actions on charging stations and use functionalities such as start/stop charging sessions, pay for usage, and locate charging stations, to name a few. In this paper, we study the security posture of the EV charging ecosystem against remote attacks, which exploit the insecurity of the EV charging mobile applications as an attack surface. We leverage a combination of static and dynamic analysis techniques to analyze the security of widely used EV charging mobile applications. Our analysis of 31 widely used mobile applications and their interactions with various components such as the cloud management systems indicate the lack of user/vehicle verification and improper authorization for critical functions, which lead to remote (dis)charging session hijacking and Denial of Service (DoS) attacks against the EV charging station. Indeed, we discuss specific remote attack scenarios and their impact on the EV users. More importantly, our analysis results demonstrate the feasibility of leveraging existing vulnerabilities across various EV charging mobile applications to perform wide-scale coordinated remote charging/discharging attacks against the connected critical infrastructure (e.g., power grid), with significant undesired economical and operational implications. Finally, we propose counter measures to secure the infrastructure and impede adversaries from performing reconnaissance and launching remote attacks using compromised accounts.
翻译:最近几年,由于多种因素的推动,EV的采用率有了显著提高,其中最主要的因素是增加灵活性和方便获取收费基础设施。为了改进用户经验,提高系统灵活性并使收费流程商业化,移动应用程序被纳入了EV收费生态系统。EV对移动应用程序的收费使消费者能够远程启动充电站的行动,并使用启动/停止充电、使用费和使用充电站等功能。本文对EV针对远程袭击指控生态系统的安全态势进行了研究,这些袭击利用了以移动应用程序为攻击表面的EV的不安全性。我们利用静态和动态分析技术来分析广泛使用的EV充电应用程序的安全性。我们对31个广泛使用的移动应用程序及其与云管理系统等各组成部分的互动的分析表明,用户/车辆缺乏对关键功能的核查和授权不当,导致远程(混乱)劫持和拒绝服务系统对EV充电站的袭击。事实上,我们讨论了具体的远程袭击情景及其对EV用户的不安全感。我们利用静态和动态分析技术来分析广泛使用的EV应用程序的安全性。更为重要的是,我们的分析将各种关键的脆弱性用于远程袭击。