TU Darmstadt / ULB / TUbiblio

WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens

Jiang, Yan ; Ji, Xiaoyu ; Wang, Kai ; Yan, Chen ; Mitev, Richard ; Sadeghi, Ahmad-Reza ; Xu, Wenyuan (2022)
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
43rd IEEE Symposium on Security and Privacy. San Francisco, USA (23.05.2022-26.05.2022)
doi: 10.1109/SP46214.2022.9833740
Konferenzveröffentlichung, Bibliographie

Kurzbeschreibung (Abstract)

The security of capacitive touchscreens is crucial since they have become the primary human-machine interface on smart devices. To the best of our knowledge, this paper presents WIGHT, the first wired attack that creates ghost touches on capacitive touchscreens via charging cables, and can manipulate the victim devices with undesired consequences, e.g., allowing malicious Bluetooth connections, accepting files with viruses, etc. Our study calls for attention to a new threat vector against touchscreens that only requires connecting to a malicious charging port, which could be a public charging station, and is effective across various power adapters and even USB data blockers. Despite the fact that smartphones employ abundant noise reduction and voltage management techniques, we manage to inject carefully crafted signals that can induce ghost touches within a chosen range. The underlying principle is to inject common-mode noises over the power line to avoid being effectively filtered yet affect the touch measurement mechanism, and synchronize the malicious noise with the screen measurement scanning cycles to place the ghost touches at target locations. We achieve three types of attacks: injection attacks that create ghost touches without users touching the screen, alteration attacks that change the detected legitimate touch position, and Denial-of-Service attacks that prevent the device from identifying legitimate touches. Our evaluation on 6 smartphones, 1 tablet, 2 standalone touchscreen panels, 6 power adapters, and 13 charging cables demonstrates the feasibility of all three type attacks.

Typ des Eintrags: Konferenzveröffentlichung
Erschienen: 2022
Autor(en): Jiang, Yan ; Ji, Xiaoyu ; Wang, Kai ; Yan, Chen ; Mitev, Richard ; Sadeghi, Ahmad-Reza ; Xu, Wenyuan
Art des Eintrags: Bibliographie
Titel: WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens
Sprache: Englisch
Publikationsjahr: 27 Juli 2022
Verlag: IEEE
Buchtitel: Proceedings: 43rd IEEE Symposium on Security and Privacy (SP 2022)
Veranstaltungstitel: 43rd IEEE Symposium on Security and Privacy
Veranstaltungsort: San Francisco, USA
Veranstaltungsdatum: 23.05.2022-26.05.2022
DOI: 10.1109/SP46214.2022.9833740
Zugehörige Links:
Kurzbeschreibung (Abstract):

The security of capacitive touchscreens is crucial since they have become the primary human-machine interface on smart devices. To the best of our knowledge, this paper presents WIGHT, the first wired attack that creates ghost touches on capacitive touchscreens via charging cables, and can manipulate the victim devices with undesired consequences, e.g., allowing malicious Bluetooth connections, accepting files with viruses, etc. Our study calls for attention to a new threat vector against touchscreens that only requires connecting to a malicious charging port, which could be a public charging station, and is effective across various power adapters and even USB data blockers. Despite the fact that smartphones employ abundant noise reduction and voltage management techniques, we manage to inject carefully crafted signals that can induce ghost touches within a chosen range. The underlying principle is to inject common-mode noises over the power line to avoid being effectively filtered yet affect the touch measurement mechanism, and synchronize the malicious noise with the screen measurement scanning cycles to place the ghost touches at target locations. We achieve three types of attacks: injection attacks that create ghost touches without users touching the screen, alteration attacks that change the detected legitimate touch position, and Denial-of-Service attacks that prevent the device from identifying legitimate touches. Our evaluation on 6 smartphones, 1 tablet, 2 standalone touchscreen panels, 6 power adapters, and 13 charging cables demonstrates the feasibility of all three type attacks.

Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Systemsicherheit
Profilbereiche
Profilbereiche > Cybersicherheit (CYSEC)
Hinterlegungsdatum: 12 Okt 2022 08:12
Letzte Änderung: 04 Mai 2023 09:56
PPN: 507428420
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen