Investigating the Security of EV Charging Mobile Applications as an Attack Surface

被引:14
作者
Sarieddine, Khaled [1 ]
Sayed, Mohammad Ali [1 ]
Torabi, Sadegh [2 ]
Atallah, Ribal [3 ]
Assi, Chadi [1 ]
机构
[1] Concordia Univ, Secur Res Ctr, 1515 St Catherine St W, Montreal H3G IS6, PQ, Canada
[2] George Mason Univ, Ctr Secure Informat Syst, 10401 York River Rd, Fairfax, VA 22030 USA
[3] Hydro Quebec Res Inst, 1800 Bd Lionel Boulet, Varennes J3X IS1, PQ, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Electric vehicle charging; cyber-physical systems; security analysis; mobile application; TOPOLOGY; IMPACT;
D O I
10.1145/3609508
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The adoption rate of EVs has witnessed a significant increase in recent years driven by multiple factors, chief among which is the increased flexibility and ease of access to charging infrastructure. To improve user experience and increase system flexibility, mobile applications have been incorporated into the EV charging ecosystem. EV charging mobile applications allow consumers to remotely trigger actions on charging stations and use functionalities such as start/stop charging sessions, pay for usage, and locate charging stations, to name a few. In this article, we study the security posture of the EV charging ecosystem against a new type of remote that exploits vulnerabilities in the EV charging mobile applications as an attack surface. We leverage a combination of static and dynamic analysis techniques to analyze the security of widely used EV charging mobile applications. Our analysis was performed on 31 of the most widely used mobile applications including their interactions with various components such as cloud management systems. The attack scenarios that exploit these vulnerabilities were verified on a real-time co-simulation test bed. Our discoveries indicate the lack of user/vehicle verification and improper authorization for critical functions, which allow adversaries to remotely hijack charging sessions and launch attacks against the connected critical infrastructure. The attacks were demonstrated using the EVCS mobile applications showing the feasibility and the applicability of our attacks. Indeed, we discuss specific remote attack scenarios and their impact on EV users. More importantly, our analysis results demonstrate the feasibility of leveraging existing vulnerabilities across various EV charging mobile applications to perform wide-scale coordinated remote charging/discharging attacks against the connected critical infrastructure (e.g., power grid), with significant economical and operational implications. Finally, we propose countermeasures to secure the infrastructure and impede adversaries from performing reconnaissance and launching remote attacks using compromised accounts.
引用
收藏
页数:28
相关论文
共 65 条
[1]  
Ac -Pm, AC-PM/inspeckage: Android Package Inspector-Dynamic Analysis with API hooks, start unexported activities and more
[2]   Cybersecurity of Smart Electric Vehicle Charging: A Power Grid Perspective [J].
Acharya, Samrat ;
Dvorkin, Yury ;
Pandzic, Hrvoje ;
Karri, Ramesh .
IEEE ACCESS, 2020, 8 :214434-214453
[3]  
Akhras R, 2020, INT WIREL COMMUN, P1672, DOI 10.1109/IWCMC48107.2020.9148345
[4]   OCPP Protocol: Security Threats and Challenges [J].
Alcaraz, Cristina ;
Lopez, Javier ;
Wolthusen, Stephen .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) :2452-2459
[5]   Analysis of user charging behavior at public charging stations [J].
Almaghrebi, Ahmad ;
Shom, Subhaditya ;
Al Juheshi, Fares ;
James, Kevin ;
Alahmad, Mahmoud .
2019 IEEE TRANSPORTATION ELECTRIFICATION CONFERENCE AND EXPO (ITEC), 2019,
[6]  
[Anonymous], 2006, Journal of Asian Electric Vehicles
[7]  
[Anonymous], 2021, APKTOOL TOOL REVERSE
[8]   A Detailed Security Assessment of the EV Charging Ecosystem [J].
Antoun, Joseph ;
Kabir, Mohammad Ekramul ;
Moussa, Bassam ;
Atallah, Ribal ;
Assi, Chadi .
IEEE NETWORK, 2020, 34 (03) :200-207
[9]  
Appium, 2021, Automation for Apps
[10]  
Australian Energy Market Operator (AEMOO), 2021, Demand Trend