Soyeon Son (Korea University) Kyungho Joo (Korea University) Wonsuk Choi (Korea University) Dong Hoon Lee (Korea University)

ETAS Best Paper Award ($500 cash prize)!

The proliferation of electric vehicles (EVs) and the simultaneous expansion of EV charging infrastructure have underscored the growing importance of securing EV charging systems. Power line communication is one of the most widely implemented communication technologies that is standardized by combined charging system (CCS) and the North American charging standard (NACS). Recently, it has been revealed that an unshielded charging cable can function as a susceptible antenna. As a result, attackers can eavesdrop on communication packets between charging stations and EVs or maliciously suspend charging sessions.

To secure EV charging systems against signal injection attack, we propose a signal cancellation system that restores benign charging sessions by annihilating the attack signal. An essential step in the proposed method is accurately estimating the carrier phase offset (CPO) and channel state values of the attack signal. Due to the inaccurate estimation of CPO and channel state values, continuous updates using linear interpolation are necessary. To evaluate the effectiveness of the proposed technique, we show that normal communication is achieved with the success of the signal level attenuation characterization (SLAC) protocol within 1.5 seconds. Experiments are conducted to determine the appropriate update parameters for attaining a 100% success rate in normal communication. We also analyze the error between the predicted CPO and channel state values and the actual CPO and channel state values of the attack signals. Furthermore, the effectiveness of the proposed method is evaluated based on the power of the injected attack signal. We have confirmed that when the power of the received attack signal is less than −31.8dBm, applying the proposed technique with the suitable update parameters leads to 100% success in normal communication.

View More Papers

Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum...

Nicola Ruaro (University of California, Santa Barbara), Fabio Gritti (University of California, Santa Barbara), Robert McLaughlin (University of California, Santa Barbara), Ilya Grishchenko (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara)

Read More

Detecting Voice Cloning Attacks via Timbre Watermarking

Chang Liu (University of Science and Technology of China), Jie Zhang (Nanyang Technological University), Tianwei Zhang (Nanyang Technological University), Xi Yang (University of Science and Technology of China), Weiming Zhang (University of Science and Technology of China), NengHai Yu (University of Science and Technology of China)

Read More

A Preliminary Study on Using Large Language Models in...

Kumar Shashwat, Francis Hahn, Xinming Ou, Dmitry Goldgof, Jay Ligatti, Larrence Hall (University of South Florida), S. Raj Rajagoppalan (Resideo), Armin Ziaie Tabari (CipherArmor)

Read More

EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras

Yan Long (University of Michigan), Qinhong Jiang (Zhejiang University), Chen Yan (Zhejiang University), Tobias Alam (University of Michigan), Xiaoyu Ji (Zhejiang University), Wenyuan Xu (Zhejiang University), Kevin Fu (Northeastern University)

Read More