February 21, 2024 at 12:15PM
University of Florida and CertiK researchers unveil the VoltSchemer attack, exploiting voltage noise from wireless charger power supplies without modifying the chargers. The attack can manipulate voice assistants, damage devices, and bypass Qi standard safety measures. The vulnerability lies in insufficient noise suppression, making all wireless charging vulnerable to interference-based attacks, as confirmed on nine commercial chargers.
The meeting notes detail a new attack called VoltSchemer, which targets vulnerabilities in wireless charging systems. This attack utilizes voltage noises from the power supply to gain control over the charging device, manipulate voice assistants, and potentially cause damage to the charged items.
The researchers found that wireless chargers are susceptible to these attacks, as they can be compromised by manipulating power signals and inducing unintended voice commands on the charged devices. Furthermore, they successfully tested VoltSchemer attacks against nine commercial wireless chargers, highlighting their vulnerability to this type of interference.
The core issue identified by the researchers is the insufficient noise suppression in certain frequency bands, leaving wireless charging systems susceptible to interference-based attacks. They also mentioned that high-power systems like electric vehicle wireless charging could potentially be vulnerable to similar attacks.
In summary, the VoltSchemer attacks raise concerns about the security of wireless charging technologies and their susceptibility to interference-based attacks, particularly in high-power systems.