{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T05:57:42Z","timestamp":1762408662025,"version":"build-2065373602"},"reference-count":73,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/tmc.2025.3587292","type":"journal-article","created":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T13:40:38Z","timestamp":1751982038000},"page":"12950-12967","source":"Crossref","is-referenced-by-count":0,"title":["When Good Becomes Evil: Exploring Crosstalk Attack Surfaces on Multi-Port USB Chargers"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0671-3020","authenticated-orcid":false,"given":"Tao","family":"Ni","sequence":"first","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8568-2121","authenticated-orcid":false,"given":"Zehua","family":"Sun","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2483-8890","authenticated-orcid":false,"given":"Yongliang","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7013-8649","authenticated-orcid":false,"given":"Yihe","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2907-0401","authenticated-orcid":false,"given":"Jiayimei","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9741-5912","authenticated-orcid":false,"given":"Weitao","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0163-2846","authenticated-orcid":false,"given":"Qingchuan","family":"Zhao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0547-315X","authenticated-orcid":false,"given":"Cong","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong"}]}],"member":"263","reference":[{"year":"2022","key":"ref1","article-title":"USB wall charger market"},{"key":"ref2","first-page":"681","article-title":"Charger-Surfing: Exploiting a power line side-channel for smartphone information leakage","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Cronin"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.05.018"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484733"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3173063"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24254"},{"key":"ref7","first-page":"1145","article-title":"USB snooping made easy: Crosstalk leakage attacks on USB hubs","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Su"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00037"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7907004"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3570361.3613293"},{"article-title":"A new EU law would force iPhones to adopt USB-C charging","year":"2022","author":"Ashworth","key":"ref11"},{"key":"ref12","first-page":"5863","article-title":"The impostor among US(B): Off-path injection attacks on USB communications","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Dumitru"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cds:19960566"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485839"},{"year":"2021","key":"ref15","article-title":"Real-time state-of-the-art speech synthesis for TensorFlow 2"},{"article-title":"WaveNet: A generative model for raw audio","year":"2016","author":"Oord","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.rse.2004.03.014"},{"key":"ref18","first-page":"187","article-title":"The effects of the irregular sample and missing data in time series analysis","volume":"10","author":"Kreindler","year":"2006","journal-title":"Nonlinear Dyn. Psychol. Life Sci."},{"issue":"1\u201323","key":"ref19","article-title":"Dynamic time warping algorithm review","volume":"855","author":"Senin","year":"2008"},{"article-title":"Exact, parallelizable dynamic time warping alignment with linear memory","year":"2020","author":"Tralie","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-019-00619-1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430781"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179364"},{"key":"ref26","first-page":"2685","article-title":"Void: A fast and light voice liveness detection system","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Ahmed"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484755"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24551"},{"year":"2022","key":"ref29","article-title":"New original replacement wire control board volume button PCB for PB3 powerbeat earphone"},{"year":"2022","key":"ref30","article-title":"Bluetooth board, DROK 12V audio receiver bluetooth"},{"year":"2022","key":"ref31","article-title":"AD620 instrumentation amplifier module"},{"article-title":"CSLU: Alphadigit version 1.3","year":"2008","author":"Cole","key":"ref32"},{"article-title":"Audio MNIST: Audio samples of spoken digits (0-9) of 60 different speakers","year":"2020","author":"Srinivasan","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3465026"},{"year":"2025","key":"ref35","article-title":"35 W dual USB-C port compact power adapter"},{"year":"2025","key":"ref36","article-title":"Belkin BoostCharge pro 4-Port USB-C GaN wall charger, 200 W"},{"year":"2025","key":"ref37","article-title":"BoostCharge pro dual USB-C GaN wall charger with PPS 65W"},{"year":"2025","key":"ref38","article-title":"ROMOSS TK12S 10.5 W 2.1 A double USB port fast charging wall charger"},{"year":"2022","key":"ref39","article-title":"Review of Apple 35 W dual USB-C compact power adapter"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160170"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC63791.2024.00046"},{"year":"2025","key":"ref42","article-title":"Anker PowerPort III 65 W 3 port wall charger black"},{"year":"2025","key":"ref43","article-title":"Xpower XP-PC240GaN 6xType-C 2xUSB-A USB charger station"},{"key":"ref44","first-page":"3511","article-title":"Eavesdropping mobile app activity via radio-frequency energy harvesting","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Ni"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229048"},{"article-title":"Documentation of manifest permission","year":"2022","author":"Developer","key":"ref46"},{"key":"ref47","first-page":"1579","article-title":"FOAP: Fine-grained open-world android app fingerprinting","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Li"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3570361.3613288"},{"year":"2022","key":"ref49","article-title":"Ams1117 1A bipolar linear regulator"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229033"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179363"},{"key":"ref52","first-page":"3979","article-title":"VoltSchemer: Use voltage noise to manipulate your wireless charger","volume-title":"Proc. 33rd USENIX Secur. Symp.","author":"Zhan"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179322"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3460418.3480399"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623153"},{"key":"ref56","first-page":"679","article-title":"Hertzbleed: Turning power side-channel attacks into remote timing attacks on x86","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Wang"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3643832.3661389"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3565268"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35504-2_3"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057232"},{"key":"ref61","first-page":"785","article-title":"PowerSpy: Location tracking using mobile device power analysis","volume-title":"Proc. 24th USENIX Secur. Symp.","author":"Michalevsky"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00250"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3641512.3686388"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00063"},{"key":"ref65","first-page":"6275","article-title":"Hot pixels: Frequency, power, and temperature attacks on GPUs and arm SoCs","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Taneja"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00098"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIC.2003.237887"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_11"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2905760.2905765"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906972"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3305607"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833740"},{"key":"ref73","first-page":"1","article-title":"PowerTouch: A security objective-guided automation framework for generating wired ghost touch attacks on touchscreens","volume-title":"Proc. 41st IEEE\/ACM Int. Conf. Comput.-Aided Des.","author":"Zhu"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/11229982\/11074308.pdf?arnumber=11074308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T05:45:46Z","timestamp":1762407946000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11074308\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":73,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2025.3587292","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"type":"print","value":"1536-1233"},{"type":"electronic","value":"1558-0660"},{"type":"electronic","value":"2161-9875"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}