Jiang, Yan ; Ji, Xiaoyu ; Wang, Kai ; Yan, Chen ; Mitev, Richard ; Sadeghi, Ahmad-Reza ; Xu, Wenyuan (2022)
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
43rd IEEE Symposium on Security and Privacy. San Francisco, USA (23.05.2022-26.05.2022)
doi: 10.1109/SP46214.2022.9833740
Konferenzveröffentlichung, Bibliographie
Kurzbeschreibung (Abstract)
The security of capacitive touchscreens is crucial since they have become the primary human-machine interface on smart devices. To the best of our knowledge, this paper presents WIGHT, the first wired attack that creates ghost touches on capacitive touchscreens via charging cables, and can manipulate the victim devices with undesired consequences, e.g., allowing malicious Bluetooth connections, accepting files with viruses, etc. Our study calls for attention to a new threat vector against touchscreens that only requires connecting to a malicious charging port, which could be a public charging station, and is effective across various power adapters and even USB data blockers. Despite the fact that smartphones employ abundant noise reduction and voltage management techniques, we manage to inject carefully crafted signals that can induce ghost touches within a chosen range. The underlying principle is to inject common-mode noises over the power line to avoid being effectively filtered yet affect the touch measurement mechanism, and synchronize the malicious noise with the screen measurement scanning cycles to place the ghost touches at target locations. We achieve three types of attacks: injection attacks that create ghost touches without users touching the screen, alteration attacks that change the detected legitimate touch position, and Denial-of-Service attacks that prevent the device from identifying legitimate touches. Our evaluation on 6 smartphones, 1 tablet, 2 standalone touchscreen panels, 6 power adapters, and 13 charging cables demonstrates the feasibility of all three type attacks.
Typ des Eintrags: | Konferenzveröffentlichung |
---|---|
Erschienen: | 2022 |
Autor(en): | Jiang, Yan ; Ji, Xiaoyu ; Wang, Kai ; Yan, Chen ; Mitev, Richard ; Sadeghi, Ahmad-Reza ; Xu, Wenyuan |
Art des Eintrags: | Bibliographie |
Titel: | WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens |
Sprache: | Englisch |
Publikationsjahr: | 27 Juli 2022 |
Verlag: | IEEE |
Buchtitel: | Proceedings: 43rd IEEE Symposium on Security and Privacy (SP 2022) |
Veranstaltungstitel: | 43rd IEEE Symposium on Security and Privacy |
Veranstaltungsort: | San Francisco, USA |
Veranstaltungsdatum: | 23.05.2022-26.05.2022 |
DOI: | 10.1109/SP46214.2022.9833740 |
Zugehörige Links: | |
Kurzbeschreibung (Abstract): | The security of capacitive touchscreens is crucial since they have become the primary human-machine interface on smart devices. To the best of our knowledge, this paper presents WIGHT, the first wired attack that creates ghost touches on capacitive touchscreens via charging cables, and can manipulate the victim devices with undesired consequences, e.g., allowing malicious Bluetooth connections, accepting files with viruses, etc. Our study calls for attention to a new threat vector against touchscreens that only requires connecting to a malicious charging port, which could be a public charging station, and is effective across various power adapters and even USB data blockers. Despite the fact that smartphones employ abundant noise reduction and voltage management techniques, we manage to inject carefully crafted signals that can induce ghost touches within a chosen range. The underlying principle is to inject common-mode noises over the power line to avoid being effectively filtered yet affect the touch measurement mechanism, and synchronize the malicious noise with the screen measurement scanning cycles to place the ghost touches at target locations. We achieve three types of attacks: injection attacks that create ghost touches without users touching the screen, alteration attacks that change the detected legitimate touch position, and Denial-of-Service attacks that prevent the device from identifying legitimate touches. Our evaluation on 6 smartphones, 1 tablet, 2 standalone touchscreen panels, 6 power adapters, and 13 charging cables demonstrates the feasibility of all three type attacks. |
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik 20 Fachbereich Informatik > Systemsicherheit Profilbereiche Profilbereiche > Cybersicherheit (CYSEC) |
Hinterlegungsdatum: | 12 Okt 2022 08:12 |
Letzte Änderung: | 04 Mai 2023 09:56 |
PPN: | 507428420 |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |