Projects per year
Abstract
In this paper, we present a novel family of USB-based attacks on mobile devices, ChoiceJacking, which is the first to bypass existing Juice Jacking mitigations. We observe that these mitigations assume that an attacker cannot inject input events while establishing a data connection. However, we show that this assumption does not hold in practice. We present a platform-agnostic attack principle and three concrete attack techniques for Android and iOS that allow a malicious charger to autonomously spoof user input to enable its own data connection. Our evaluation using a custom cheap malicious charger design reveals an alarming state of USB security on mobile platforms. Despite vendor customizations in USB stacks, ChoiceJacking attacks gain access to sensitive user files (pictures, documents, app data) on all tested devices from 8 vendors including the top 6 by market share. For two vendors, our attacks allow file extraction from locked devices. For stealthily performing attacks that require an unlocked device, we use a power line side-channel to detect suitable moments, i.e., when the user does not notice visual artifacts.
We responsibly disclosed all findings to affected vendors. All but one (including Google, Samsung, Xiaomi, and Apple) acknowledged our attacks and are in the process of integrating mitigations.
Original language | English |
---|---|
Title of host publication | Usenix Security Symposium 2025 |
Publication status | Accepted/In press - 2025 |
Event | 34th USENIX Security Symposium: USENIX Security 2025 - Seattle, United States Duration: 13 Aug 2025 → 15 Aug 2025 Conference number: 34 https://www.usenix.org/conference/usenixsecurity25 |
Conference
Conference | 34th USENIX Security Symposium |
---|---|
Abbreviated title | USENIX'25 |
Country/Territory | United States |
City | Seattle |
Period | 13/08/25 → 15/08/25 |
Internet address |
Keywords
- Mobile Security
Fingerprint
Dive into the research topics of 'ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago'. Together they form a unique fingerprint.Projects
- 2 Finished
-
SEIZE - Secure Edge Devices For Industrial Zero-Trust Environments
Mangard, S. (Co-Investigator (CoI))
1/01/22 → 31/12/24
Project: Research project
-
A-SIT - Secure Information Technology Center Austria
Stranacher, K. (Co-Investigator (CoI)), Dominikus, S. (Co-Investigator (CoI)), Leitold, H. (Co-Investigator (CoI)), Marsalek, A. (Co-Investigator (CoI)), Teufl, P. (Co-Investigator (CoI)), Bauer, W. (Co-Investigator (CoI)), Aigner, M. J. (Co-Investigator (CoI)), Rössler, T. (Co-Investigator (CoI)), Neuherz, E. (Co-Investigator (CoI)), Dietrich, K. (Co-Investigator (CoI)), Zefferer, T. (Co-Investigator (CoI)), Mangard, S. (Co-Investigator (CoI)), Payer, U. (Co-Investigator (CoI)), Orthacker, C. (Co-Investigator (CoI)), Lipp, P. (Co-Investigator (CoI)), Reiter, A. (Co-Investigator (CoI)), Knall, T. (Co-Investigator (CoI)), Bratko, H. (Co-Investigator (CoI)), Bonato, M. (Co-Investigator (CoI)), Suzic, B. (Co-Investigator (CoI)), Zwattendorfer, B. (Co-Investigator (CoI)), Kreuzhuber, S. (Co-Investigator (CoI)), Oswald, M. E. (Co-Investigator (CoI)), Tauber, A. (Co-Investigator (CoI)), Posch, R. (Principal Investigator (PI)), Bratko, D. (Co-Investigator (CoI)), Feichtner, J. (Co-Investigator (CoI)), Ivkovic, M. (Co-Investigator (CoI)), Reimair, F. (Co-Investigator (CoI)), Wolkerstorfer, J. (Co-Investigator (CoI)) & Scheibelhofer, K. (Co-Investigator (CoI))
21/05/99 → 31/12/24
Project: Research area