About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper · Book chapter

Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks

From

Department of Applied Mathematics and Computer Science, Technical University of Denmark1

Cyber Security, Department of Applied Mathematics and Computer Science, Technical University of Denmark2

City University of Hong Kong3

Technical University of Denmark4

Hong Kong Polytechnic University5

The increasingly high demand for smartphone charging in people’s daily lives has apparently encouraged much more public charging stations to be deployed in various places (e.g., shopping malls, airports). However, these public charging facilities may open a hole for cyber-criminals to infer private information and data from smartphone users.

Juice filming charging (JFC) attack is a particular type of charging attacks, which is capable of stealing users’ sensitive information from both Android OS and iOS devices, through automatically monitoring and recording phone screen during the whole charging period. The rationale is that phone screen can be leaked through a standard micro USB connector, which adopts the Mobile High-Definition Link (MHL) standard.

In practice, we identify that how to efficiently extract information from the captured videos remains a challenge for current JFC attack. To further investigate its practical influence, in this work, we focus on enhancing its performance in the aspects of extracting texts from images and correlating information, and then conducting a user study in a practical scenario.

The obtained results demonstrate that our enhanced JFC attack can outperform the original one in collecting users’ information at large and extracting sensitive data with a higher accuracy. Our work aims to complement existing results and stimulate more efforts in defending smartphones against charging threats.

Language: English
Publisher: Springer
Year: 2017
Pages: 291-308
Proceedings: 20th International conference on information security
Series: Lecture Notes in Computer Science
Journal subtitle: 20th International Conference, Isc 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings
ISBN: 3319696580 , 3319696599 , 9783319696584 and 9783319696591
ISSN: 03029743
Types: Conference paper and Book chapter
DOI: 10.1007/978-3-319-69659-1_16
ORCIDs: Meng, Weizhi

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis