论文标题

调查电动汽车充电移动应用的安全性作为攻击表面

Investigating the Security of EV Charging Mobile Applications As an Attack Surface

论文作者

Sarieddine, K., Sayed, M. A., Torabi, S., Atallah, R., Assi, C.

论文摘要

在本文中,我们研究了EV充电生态系统的安全姿势,以将EV充电应用程序中的漏洞作为攻击表面中利用漏洞的新型遥控器。我们利用静态和动态分析技术的组合来分析广泛使用的EV充电移动应用程序的安全性。我们的分析是对31个最广泛使用的移动应用程序进行的,包括它们与云管理系统等各种组件的交互。在实时共同模拟床上验证了利用这些漏洞的攻击场景。我们的发现表明,缺乏对关键功能的用户/车辆验证和不当授权,这使对手可以远程劫持会话和针对连接的关键基础架构的攻击。使用EVCS移动应用程序显示了攻击,显示了我们攻击的可行性和适用性。确实,我们讨论了特定的远程攻击方案及其对电动汽车用户的影响。更重要的是,我们的分析结果表明,利用各种EV充电应用程序中现有脆弱性的可行性,以对有关关联关键的关键基础设施(例如,电网)进行大规模协调的远程充电/放电攻击,具有很大的经济和操作。最后,我们提出了对策,以确保基础架构并阻止对手进行侦察和使用折衷的帐户发动远程攻击。

In this paper, we study the security posture of the EV charging ecosystem against a new type of remote that exploits vulnerabilities in the EV charging mobile applications as an attack surface. We leverage a combination of static and dynamic analysis techniques to analyze the security of widely used EV charging mobile applications. Our analysis was performed on 31 of the most widely used mobile applications including their interactions with various components such as cloud management systems. The attack, scenarios that exploit these vulnerabilities were verified on a real-time co-simulation test bed. Our discoveries indicate the lack of user/vehicle verification and improper authorization for critical functions, which allow adversaries to remotely hijack charging sessions and launch attacks against the connected critical infrastructure. The attacks were demonstrated using the EVCS mobile applications showing the feasibility and the applicability of our attacks. Indeed, we discuss specific remote attack scenarios and their impact on EV users. More importantly, our analysis results demonstrate the feasibility of leveraging existing vulnerabilities across various EV charging mobile applications to perform wide-scale coordinated remote charging/discharging attacks against the connected critical infrastructure (e.g., power grid), with significant economical and operational implications. Finally, we propose countermeasures to secure the infrastructure and impede adversaries from performing reconnaissance and launching remote attacks using compromised accounts.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源