{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:59:42Z","timestamp":1773511182773,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484733","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"651-665","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Wireless Charging Power Side-Channel Attacks"],"prefix":"10.1145","author":[{"given":"Alexander S.","family":"La Cour","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Khurram K.","family":"Afridi","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"G. Edward","family":"Suh","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Article arXiv:1803.08375 (March","author":"Agarap Abien Fred","year":"2018","unstructured":"Abien Fred Agarap. 2018. Deep Learning using Rectified Linear Units (ReLU). arXiv e-prints, Article arXiv:1803.08375 (March 2018), arXiv:1803.08375 pages. arXiv:1803.08375 [cs.NE]"},{"key":"e_1_3_2_1_2_1","unstructured":"Aircharge. [n.d.]. Charger Locator App. https:\/\/www.air-charge.com\/app."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2817-4"},{"key":"e_1_3_2_1_4_1","unstructured":"Apple. 2020. About Optimized Battery Charging on your iPhone. https:\/\/support.apple.com\/en-us\/HT210512"},{"key":"e_1_3_2_1_5_1","unstructured":"Callum Booth. 2019. Wireless charging is cool but won't replace cables anytime soon. https:\/\/thenextweb.com\/plugged\/2019\/01\/28\/wireless-charging-cables-bisresearch\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_7_1","unstructured":"Jason Brownlee. 2018. 1D Convolutional Neural Network Models for Human Activity Recognition. https:\/\/machinelearningmastery.com\/cnn-models-forhuman-activity-recognition-time-series-classification\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/keras.io."},{"key":"e_1_3_2_1_9_1","volume-title":"Current Events: Identifying Webpages by Tapping the Electrical Outlet. In Computer Security -- ESORICS","author":"Clark Shane S.","year":"2013","unstructured":"Shane S. Clark, Hossen Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu, and Wenyuan Xu. 2013. Current Events: Identifying Webpages by Tapping the Electrical Outlet. In Computer Security -- ESORICS 2013, Jason Crampton, Sushil Jajodia, and Keith Mayes (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 700--717."},{"key":"e_1_3_2_1_10_1","volume-title":"2013 USENIX Workshop on Health Information Technologies (HealthTech 13)","author":"Clark Shane S.","year":"2013","unstructured":"Shane S. Clark, Benjamin Ransford, Amir Rahmati, Shane Guineau, Jacob Sorber, Wenyuan Xu, and Kevin Fu. 2013. WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices. In 2013 USENIX Workshop on Health Information Technologies (HealthTech 13). USENIX Association, Washington, D.C. https:\/\/www.usenix.org\/conference\/healthtech13\/workshop-program\/presentation\/clark"},{"key":"e_1_3_2_1_11_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Cronin Patrick","year":"2021","unstructured":"Patrick Cronin, Xing Gao, Chengmo Yang, and Haining Wang. 2021. Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/cronin"},{"key":"e_1_3_2_1_12_1","unstructured":"Scott Dearborn. [n.d.]. Charging Lithium-Ion Batteries: Not All Charging Systems Are Created Equal. https:\/\/www.microchip.com\/stellent\/groups\/designcenter_sg\/documents\/market_communication\/en028061.pdf last accessed on 08\/28\/19."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978353"},{"key":"e_1_3_2_1_14_1","unstructured":"Nick Guy. 2020. Is Charging Your Phone All Day Really That Bad? https:\/\/www.nytimes.com\/2020\/09\/04\/smarter-living\/phone-charging-advice.html."},{"key":"e_1_3_2_1_15_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis. 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 1187--1203. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/hayes"},{"key":"e_1_3_2_1_16_1","volume-title":"Fingerprinting Websites Using Traffic Analysis","author":"Hintz Andrew","unstructured":"Andrew Hintz. 2003. Fingerprinting Websites Using Traffic Analysis. In Privacy Enhancing Technologies, Roger Dingledine and Paul Syverson (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 171--178."},{"key":"e_1_3_2_1_17_1","unstructured":"Alexa Internet. 2020. Top Sites in United States. https:\/\/www.alexa.com\/topsites\/countries\/US."},{"key":"e_1_3_2_1_18_1","unstructured":"Inviolabs. 2019. iPhone 11 Charging Test. Which USB PD Charger is better? https:\/\/www.inviolabs.com\/blogs\/news\/iphone-11-charging-test-whichusb-pd-charger-is-better."},{"key":"e_1_3_2_1_19_1","unstructured":"Keith Ito and Linda Johnson. 2017. The LJ Speech Dataset. https:\/\/keithito.com\/LJSpeech-Dataset\/."},{"key":"e_1_3_2_1_20_1","volume-title":"Inman","author":"Kiranyaz Serkan","year":"2019","unstructured":"Serkan Kiranyaz, Onur Avci, Osama Abdeljaber, Turker Ince, Moncef Gabbouj, and Daniel J. Inman. 2019. 1D Convolutional Neural Networks and Applications: A Survey. arXiv:1905.03554 [eess.SP]"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_22_1","unstructured":"John Leyden. 2018. Battery charger hack offers covert way to spy on mobile devices. https:\/\/portswigger.net\/daily-swig\/battery-charger-hack-offers-covertway-to-spy-on-mobile-devices."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0036"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2021.100007"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888881.1888898"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3375732"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338498.3358650"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359621"},{"key":"e_1_3_2_1_29_1","volume-title":"Power Analysis Attacks and Countermeasures","author":"Popp Thomas","year":"2007","unstructured":"Thomas Popp, Stefan Mangard, and Elisabeth Oswald. 2007. Power Analysis Attacks and Countermeasures. IEEE Design & Test of Computers 24 (2007)."},{"key":"e_1_3_2_1_30_1","volume-title":"Petros G. Voulgaris, and Josep Torrellas.","author":"Pothukuchi Raghavendra Pradyumna","year":"2019","unstructured":"Raghavendra Pradyumna Pothukuchi, Sweta Yamini Pothukuchi, Petros G. Voulgaris, and Josep Torrellas. 2019. Maya: Falsifying Power Sidechannels with Operating System Support. CoRR abs\/1907.09440 (2019). arXiv:1907.09440 http:\/\/arxiv.org\/abs\/1907.09440"},{"key":"e_1_3_2_1_31_1","volume-title":"Qi Enabled Phones & Compatible Devices","year":"2020","unstructured":"Qi-Wireless-Charging.net. 2020. Qi Enabled Phones & Compatible Devices 2020. https:\/\/qi-wireless-charging.net\/qi-enabled-phones\/."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","unstructured":"Yi Qin and Chuan Yue. 2018. Website Fingerprinting by Power Estimation Based Side-Channel Attacks on Android 7. In 2018 17th IEEE International Conference On Trust Security And Privacy In Computing And Communications\/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). 1030--1039. https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00145","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00145"},{"key":"e_1_3_2_1_33_1","unstructured":"Caleb Rule. 2020. Average Load Times Core Web Vitals & More: Fortune 100 Website Speed Tests. https:\/\/www.pedowitzgroup.com\/fortune-100-websites\/."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","unstructured":"Lamyaa Sadouk. 2019. CNN Approaches for Time Series Classification. In Time Series Analysis - Data Methods and Applications Chun-Kit Ngan (Ed.). IntechOpen. https:\/\/doi.org\/10.5772\/intechopen.81170","DOI":"10.5772\/intechopen.81170"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178838"},{"key":"e_1_3_2_1_36_1","unstructured":"Laura Silver. 2019. Smartphone Ownership Is Growing Rapidly Around the World but Not Always Equally. https:\/\/www.pewresearch.org\/global\/2019\/02\/05\/smartphone-ownership-is-growing-rapidly-around-the-world-but-notalways-equally\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Riccardo Spolaor Laila Abudahi Veelasha Moonsamy Mauro Conti and Radha Poovendran. 2016. No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices. arXiv:1609.02750 [cs.CR]","DOI":"10.1007\/978-3-319-61204-1_5"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2779824"},{"key":"e_1_3_2_1_39_1","volume-title":"Survey Report: Cell Phone Battery Statistics 2015--2018. https:\/\/veloxity.us\/2015-phone-battery-statistics\/.","author":"Team The Veloxity","year":"2015","unstructured":"The Veloxity Team. 2015. Survey Report: Cell Phone Battery Statistics 2015--2018. https:\/\/veloxity.us\/2015-phone-battery-statistics\/."},{"key":"e_1_3_2_1_40_1","unstructured":"Lance Whitney. 2017. Why You Shouldn't Charge Your Mobile Phone Overnight. https:\/\/time.com\/4949569\/mobile-phone-charge-overnight\/."},{"issue":"2","key":"e_1_3_2_1_41_1","first-page":"3","article-title":"The Qi Wireless Power Transfer System Parts 1 and 2","volume":"1","author":"Wireless Power Consortium","year":"2017","unstructured":"Wireless Power Consortium. 2017. The Qi Wireless Power Transfer System Parts 1 and 2: Interface Definitions Version 1.2.3. Available at https:\/\/www.wirelesspowerconsortium.com\/knowledge-base\/specifications\/download-the-qi-specifications.html.","journal-title":"Interface Definitions Version"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875913.2875934"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433169"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2639446"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2020.i1.1--36"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3024572"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484733","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:49:10Z","timestamp":1763498950000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484733"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":46,"alternative-id":["10.1145\/3460120.3484733","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484733","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}