Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Investigating the Security of EV Charging Mobile Applications as an Attack Surface

Published: 14 October 2023 Publication History
  • Get Citation Alerts
  • Abstract

    The adoption rate of EVs has witnessed a significant increase in recent years driven by multiple factors, chief among which is the increased flexibility and ease of access to charging infrastructure. To improve user experience and increase system flexibility, mobile applications have been incorporated into the EV charging ecosystem. EV charging mobile applications allow consumers to remotely trigger actions on charging stations and use functionalities such as start/stop charging sessions, pay for usage, and locate charging stations, to name a few. In this article, we study the security posture of the EV charging ecosystem against a new type of remote that exploits vulnerabilities in the EV charging mobile applications as an attack surface. We leverage a combination of static and dynamic analysis techniques to analyze the security of widely used EV charging mobile applications. Our analysis was performed on 31 of the most widely used mobile applications including their interactions with various components such as cloud management systems. The attack scenarios that exploit these vulnerabilities were verified on a real-time co-simulation test bed. Our discoveries indicate the lack of user/vehicle verification and improper authorization for critical functions, which allow adversaries to remotely hijack charging sessions and launch attacks against the connected critical infrastructure. The attacks were demonstrated using the EVCS mobile applications showing the feasibility and the applicability of our attacks. Indeed, we discuss specific remote attack scenarios and their impact on EV users. More importantly, our analysis results demonstrate the feasibility of leveraging existing vulnerabilities across various EV charging mobile applications to perform wide-scale coordinated remote charging/discharging attacks against the connected critical infrastructure (e.g., power grid), with significant economical and operational implications. Finally, we propose countermeasures to secure the infrastructure and impede adversaries from performing reconnaissance and launching remote attacks using compromised accounts.

    References

    [2]
    Linda Gyulai. 2020. Montreal’s climate plan includes ban on non-electric cars downtown by 2030. https://montrealgazette.com/news/local-news/montreal-releases-climate-plan-including-ban-on-non-electric-cars-downtown-by-2030
    [3]
    Charles Riley. 2021. Europe aims to kill gasoline and diesel cars by 2035. https://edition.cnn.com/2021/07/14/business/eu-emissions-climate-cars/index.html
    [5]
    Samrat Acharya, Yury Dvorkin, Hrvoje Pandžić, and Ramesh Karri. 2020. Cybersecurity of smart electric vehicle charging: A power grid perspective. IEEE Access 8 (2020), 214434–214453.
    [6]
    Mohammad Ali Sayed, Ribal Atallah, Chadi Assi, and Mourad Debbabi. 2021. Electric vehicle attack impact on power grid operation. International Journal of Electrical Power & Energy Systems 112 (2021), 107784. DOI:
    [7]
    Tony Nasr, Sadegh Torabi, Elias Bou-Harb, Claude Fachkha, and Chadi Assi. 2021. Power jacking your station: In-depth security analysis of electric vehicle charging station management systems. Computers & Security (2021), 102511.
    [8]
    R. Akhras, W. El-Hajj, M. Majdalani, H. Hajj, R. Jabr, and K. Shaban. 2020. Securing smart grid communication using ethereum smart contracts. International Wireless Communications and Mobile Computing (IWCMC’20). Limassol, Cyprus, 1672–1678. DOI:
    [9]
    Cristina Alcaraz, Javier Lopez, and Stephen Wolthusen. 2017. OCPP protocol: Security threats and challenges. IEEE Transactions on Smart Grid 8, 5 (2017), 2452–2459.
    [10]
    Juan E. Rubio, Cristina Alcaraz, and Javier Lopez. 2018. Addressing security in OCPP: Protection against man-in-the-middle attacks. In 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS’18). IEEE, 1–5.
    [11]
    Hossam ElHussini, Chadi Assi, Bassam Moussa, Ribal Atallah, and Ali Ghrayeb. 2021. A tale of two entities: Contextualizing the security of electric vehicle charging stations on the power grid. ACM Transactions on Internet of Things 2, 2 (2021), 1–21.
    [12]
    Joseph Antoun, Mohammad Ekramul Kabir, Bassam Moussa, Ribal Atallah, and Chadi Assi. 2020. A detailed security assessment of the EV charging ecosystem. IEEE Network 34, 3 (2020), 200–207.
    [13]
    Open Charge Alliance. 2021. OCPP 2.0.1, protocols, home. https://www.openchargealliance.org/protocols/ocpp-201/
    [14]
    Richard Baker and Ivan Martinovic. 2019. Losing the car keys: Wireless phy-layer insecurity in EV charging. In 28th USENIX Security Symposium (USENIX Security’19). 407–424.
    [15]
    Y. S. Wong, K. T. Chau, and C. C. Chan. 2006. Battery sizing for plug-in hybrid electric vehicles. Journal of Asian Electric Vehicles 4, 2 (2006), 899–904.
    [16]
    Kaspersky Lab. 2021. How do fuel cell electric vehicles work Using hydrogen?https://afdc.energy.gov/vehicles/how-do-fuel-cell-electric-cars-work
    [18]
    Juan E. Rubio, Cristina Alcaraz, and Javier Lopez. 2018. Addressing security in OCPP: Protection against man-in-the-middle attacks. In 2018 9th IFIP International Conference on New Technologies, Mobility and Security. 1–5.
    [19]
    Omniyah Gul M. Khan, Ehab El-Saadany, Amr Youssef, and Mostafa Shaaban. 2019. Impact of electric vehicles botnets on the power grid. In 2019 IEEE Electrical Power and Energy Conference (EPEC’19). IEEE, 1–5.
    [20]
    Kristien Clement-Nyns, Edwin Haesen, and Johan Driesen. 2009. The impact of charging plug-in hybrid electric vehicles on a residential distribution grid. IEEE Transactions on Power Systems 25, 1 (2009), 371–380.
    [21]
    Niels Leemput, Frederik Geth, Juan Van Roy, Annelies Delnooz, Jeroen Büscher, and Johan Driesen. 2014. Impact of electric vehicle on-board single-phase charging strategies on a flemish residential grid. IEEE Transactions on Smart Grid 5, 4 (2014), 1815–1822.
    [22]
    Anamika Dubey and Surya Santoso. 2015. Electric vehicle charging on residential distribution systems: Impacts and mitigations. IEEE Access 3 (2015), 1871–1893.
    [23]
    Hugo Morais, Tiago Sousa, Zita Vale, and Pedro Faria. 2014. Evaluation of the electric vehicle impact in the power demand curve in a smart grid environment. Energy Conversion and Management 82 (2014), 268–282.
    [24]
    Soroush Shafiee, Mahmud Fotuhi-Firuzabad, and Mohammad Rastegar. 2013. Investigating the impacts of plug-in hybrid electric vehicles on power distribution systems. IEEE Transactions on Smart Grid 4, 3 (2013), 1351–1360.
    [25]
    Elif Ustundag Soykan, Mustafa Bagriyanik, and Gurkan Soykan. 2021. Disrupting the power grid via EV charging: The impact of the SMS Phishing attacks. Sustainable Energy, Grids and Networks 26 (2021), 100477.
    [26]
    Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, and Yuqing Zhang. 2019. Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms. In 28th USENIX Security Symposium (USENIX Security’19). 1133–1150.
    [28]
    2021. apktool - a tool for reverse engineering 3rd party, closed, binary android apps.https://ibotpeaches.github.io/Apktool/
    [29]
    KALI. 2021. Dex2jar: Kali linux tools. https://www.kali.org/tools/dex2jar/
    [30]
    KALI. 2021. JD-Gui: Kali linux tools. https://www.kali.org/tools/jd-gui/
    [31]
    MobSF. 2021. Mobile security framework (mobsf). https://github.com/MobSF/Mobile-Security-Framework-MobSF
    [32]
    Pkumza. 2021. pkumza/LiteRadar: Lite version of LibRadar. https://github.com/pkumza/LiteRadar
    [33]
    Shengqian Yang, Dacong Yan, Haowei Wu, Yan Wang, and Atanas Rountev. 2015. Static control-flow analysis of user-driven callbacks in Android applications. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol. 1. IEEE, 89–99.
    [34]
    Tanzirul Azim and Iulian Neamtiu. 2013. Targeted and depth-first exploration for systematic testing of Android apps. In Proceedings of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications. 641–660.
    [35]
    GPS Joystick Guide-the app ninjas. n. d.http://gpsjoystick.theappninjas.com/
    [36]
    SHIVAM says. 2021. Virtualxposed APK 0.20.3 download latest in 2021 [official]. https://virtualxposed.com/
    [37]
    Ac-Pm. n.d. AC-PM/inspeckage: Android Package Inspector - Dynamic Analysis with API hooks, start unexported activities and more. (Xposed module). https://github.com/ac-pm/Inspeckage
    [38]
    Jens Schmutzler, Claus Amtrup Andersen, and Christian Wietfeld. 2021. Burp Suite - Application Security Testing Software. https://portswigger.net/burp
    [39]
    Jens Schmutzler, Claus Amtrup Andersen, and Christian Wietfeld. 2013. Evaluation of OCPP and IEC 61850 for smart charging electric vehicles. World Electric Vehicle Journal 6, 4 (2013), 863–874.
    [40]
    Jens Schmutzler, Christian Wietfeld, and Claus Amtrup Andersen. 2012. Distributed energy resource management for electric vehicles using IEC 61850 and ISO/IEC 15118. In 2012 IEEE Vehicle Power and Propulsion Conference. IEEE, 1457–1462.
    [41]
    Communication apis for SMS, Voice, Video & Authentication. [n. d.]https://www.twilio.com/
    [42]
    Yu-Wei Chung, Behnam Khaki, Tianyi Li, Chicheng Chu, and Rajit Gadh. 2019. Ensemble machine learning-based algorithm for electric vehicle user behavior prediction. Applied Energy 254 (2019), 113732.
    [43]
    Ahmad Almaghrebi, Subhaditya Shom, Fares Al Juheshi, Kevin James, and Mahmoud Alahmad. 2019. Analysis of user charging behavior at public charging stations. In 2019 IEEE Transportation Electrification Conference and Expo (ITEC’19). IEEE, 1–6.
    [44]
    Tai-Yu Ma and Sébastien Faye. 2022. Multistep electric vehicle charging station occupancy prediction using hybrid LSTM neural networks. Energy vol 244, part B (2022), 123217.
    [45]
    Zachary J. Lee, Tongxin Li, and Steven H. Low. 2019. ACN-data: Analysis and applications of an open EV charging dataset. In Proceedings of the 10th ACM International Conference on Future Energy Systems. 139–149.
    [46]
    Appium. 2021. Automation for Apps. https://appium.io/
    [47]
    Saleh Soltan, Prateek Mittal, and H. Vincent Poor. 2018. BlackIoT: IoT botnet of high wattage devices can disrupt the power grid. In 27th USENIX Security Symposium (USENIX Security’18). 15–32.
    [48]
    K. Sarieddine, M. A. Sayed, D. Jafarigiv, R. Atallah, M. Debbabi, and C. Assi. 2023. A real-time cosimulation testbed for electric vehicle charging and smart grid security. In IEEE Security & Privacy 21, 4 (2023), 74–83. DOI:
    [49]
    Yosra Fraiji, Lamia Ben Azzouz, Wassim Trojet, and Leila Azouz Saidane. 2018. Cyber security issues of Internet of electric vehicles. In 2018 IEEE Wireless Communications and Networking Conference (WCNC’18). IEEE, 1–6.
    [50]
    Richard M. Pratt and Thomas E. Carroll. 2019. Vehicle charging infrastructure security. In 2019 IEEE International Conference on Consumer Electronics (ICCE’19). IEEE, 1–5.
    [52]
    Australian Energy Market Operator (AEMOO). 2021. Demand Trend. https://aemo.com.au/en
    [53]
    Guido Cavraro, Andrey Bernstein, Vassilis Kekatos, and Yingchen Zhang. 2019. Real-time identifiability of power distribution network topologies with limited monitoring. IEEE Control Systems Letters 4, 2 (2019), 325–330.
    [54]
    Seyed Iman Taheri, M. B. C. Salles, and N. Kagan. 2019. A new modified TLBO algorithm for placement of AVRs in distribution system. In 2019 IEEE PES Innovative Smart Grid Technologies Conference-Latin America. IEEE, 1–6.
    [55]
    Guido Cavraro and Vassilis Kekatos. 2019. Inverter probing for power distribution network topology processing. IEEE Transactions on Control of Network Systems 6, 3 (2019), 980–992.
    [56]
    Keith Moffat, Mohini Bariya, and Alexandra Von Meier. 2019. Unsupervised impedance and topology estimation of distribution networks—limitations and tools. IEEE Transactions on Smart Grid 11, 1 (2019), 846–856.
    [57]
    Anandini Gandluru, Shiva Poudel, and Anamika Dubey. 2019. Joint estimation of operational topology and outages for unbalanced power distribution systems. IEEE Transactions on Power Systems 35, 1 (2019), 605–617.
    [58]
    Deepjyoti Deka, Michael Chertkov, and Scott Backhaus. 2019. Topology estimation using graphical models in multi-phase power distribution grids. IEEE Transactions on Power Systems 35, 3 (2019), 1663–1673.
    [59]
    Keith Moffat, Mohini Bariya, and Alexandra Von Meier. 2020. Real time effective impedance estimation for power system state estimation. In 2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT’20). IEEE, 1–5.
    [60]
    Prabha Kundur. 2007. Power system stability. Power System Stability and Control, (3rd edition), (2007), 7–1.
    [61]
    J. Duncan Glover, Mulukutla S. Sarma, and Thomas Overbye. 2012. Power System Analysis & Design, SI Version. Cengage Learning.
    [63]
    Bing Huang, Alvaro A. Cardenas, and Ross Baldick. 2019. Not everything is dark and gloomy: Power grid protections against IoT demand attacks. In 28th USENIX Security Symposium (USENIX Security’19). 1115–1132.
    [64]
    M. E. Kabir, M. Ghafouri, B. Moussa, and C. Assi. 2021. A two-stage protection method for detection and mitigation of coordinated EVSE switching attacks. In IEEE Transactions on Smart Grid 12, 5 (2021), 4377–4388. DOI:
    [66]
    Smartcar · API platform for Connected Car Data. n.d.https://smartcar.com/

    Cited By

    View all
    • (2024)Off-Grid Electric Vehicle Charging Station with Integrated Local Server OCPP Protocol as a Management SystemTransport and Telecommunication Journal10.2478/ttj-2024-002425:3(321-334)Online publication date: 26-Jun-2024
    • (2024)Smart, Secure and Interoperable Charging Infrastructure with Plug and Charge2024 12th International Conference on Smart Grid (icSmartGrid)10.1109/icSmartGrid61824.2024.10578287(174-180)Online publication date: 27-May-2024
    • (2024)Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024Data and Applications Security and Privacy XXXVIII10.1007/978-3-031-65172-4_11(171-190)Online publication date: 14-Jul-2024
    • Show More Cited By

    Index Terms

    1. Investigating the Security of EV Charging Mobile Applications as an Attack Surface

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Cyber-Physical Systems
      ACM Transactions on Cyber-Physical Systems  Volume 7, Issue 4
      October 2023
      199 pages
      ISSN:2378-962X
      EISSN:2378-9638
      DOI:10.1145/3627765
      • Editor:
      • Chenyang Lu
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Journal Family

      Publication History

      Published: 14 October 2023
      Online AM: 28 July 2023
      Accepted: 01 July 2023
      Revised: 24 May 2023
      Received: 26 February 2023
      Published in TCPS Volume 7, Issue 4

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Electric vehicle charging
      2. cyber-physical systems
      3. security analysis
      4. mobile application

      Qualifiers

      • Research-article

      Funding Sources

      • Concordia University/Hydro-Quebec/NSERC
      • Large-scale Integration of EVCSs into the Smart Grid: A Comprehensive Cyber-physical Study and Security Assessment

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)729
      • Downloads (Last 6 weeks)51
      Reflects downloads up to 30 Jul 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Off-Grid Electric Vehicle Charging Station with Integrated Local Server OCPP Protocol as a Management SystemTransport and Telecommunication Journal10.2478/ttj-2024-002425:3(321-334)Online publication date: 26-Jun-2024
      • (2024)Smart, Secure and Interoperable Charging Infrastructure with Plug and Charge2024 12th International Conference on Smart Grid (icSmartGrid)10.1109/icSmartGrid61824.2024.10578287(174-180)Online publication date: 27-May-2024
      • (2024)Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024Data and Applications Security and Privacy XXXVIII10.1007/978-3-031-65172-4_11(171-190)Online publication date: 14-Jul-2024
      • (2024)Vulnerability Analysis of an Electric Vehicle Charging EcosystemCritical Information Infrastructures Security10.1007/978-3-031-62139-0_9(155-173)Online publication date: 27-Jun-2024
      • (2023)EV Charging Infrastructure Discovery to Contextualize Its Deployment SecurityIEEE Transactions on Network and Service Management10.1109/TNSM.2023.331840621:1(1287-1301)Online publication date: 4-Oct-2023

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media