首页> 外文OA文献 >No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices
【2h】

No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices

机译:无自由充电定理:通过UsB充电电缆打开隐蔽通道   移动设备

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

More and more people are regularly using mobile and battery-powered handsets,such as smartphones and tablets. At the same time, thanks to the technologicalinnovation and to the high user demands, those devices are integratingextensive functionalities and developers are writing battery-draining apps,which results in a surge of energy consumption of these devices. This scenarioleads many people to often look for opportunities to charge their devices atpublic charging stations: the presence of such stations is already prominentaround public areas such as hotels, shopping malls, airports, gyms and museums,and is expected to significantly grow in the future. While most of the time thepower comes for free, there is no guarantee that the charging station is notmaliciously controlled by an adversary, with the intention to exfiltrate datafrom the devices that are connected to it. In this paper, we illustrate for the first time how an adversary couldleverage a maliciously controlled charging station to exfiltrate data from thesmartphone via a USB charging cable (i.e., without using the data transferfunctionality), controlling a simple app running on the device, and withoutrequiring any permission to be granted by the user to send data out of thedevice. We show the feasibility of the proposed attack through a prototypeimplementation in Android, which is able to send out potentially sensitiveinformation, such as IMEI, contacts' phone number, and pictures.
机译:越来越多的人定期使用移动和电池供电的手机,例如智能手机和平板电脑。同时,由于技术创新和对用户的高要求,这些设备集成了广泛的功能,而开发人员正在编写耗电的应用程序,这导致这些设备的能耗激增。这种情况导致许多人经常寻找在公共充电站为设备充电的机会:此类充电站的存在已在酒店,购物中心,机场,体育馆和博物馆等公共场所周围突出,并且有望在未来显着增长。虽然大多数时候免费提供该电源,但不能保证该充电站不受对手的恶意控制,目的是从与其连接的设备中窃取数据。在本文中,我们首次说明了攻击者如何利用恶意控制的充电站通过USB充电电缆(即,不使用数据传输功能)从智能手机中窃取数据,控制在设备上运行的简单应用程序而无需用户授予的从设备发送数据的任何许可。我们通过Android中的原型实现展示了提议的攻击的可行性,该原型实现能够发出潜在的敏感信息,例如IMEI,联系人的电话号码和图片。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号