[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Investigating the Security of EV Charging Mobile Applications as an Attack Surface

Published: 14 October 2023 Publication History

Abstract

The adoption rate of EVs has witnessed a significant increase in recent years driven by multiple factors, chief among which is the increased flexibility and ease of access to charging infrastructure. To improve user experience and increase system flexibility, mobile applications have been incorporated into the EV charging ecosystem. EV charging mobile applications allow consumers to remotely trigger actions on charging stations and use functionalities such as start/stop charging sessions, pay for usage, and locate charging stations, to name a few. In this article, we study the security posture of the EV charging ecosystem against a new type of remote that exploits vulnerabilities in the EV charging mobile applications as an attack surface. We leverage a combination of static and dynamic analysis techniques to analyze the security of widely used EV charging mobile applications. Our analysis was performed on 31 of the most widely used mobile applications including their interactions with various components such as cloud management systems. The attack scenarios that exploit these vulnerabilities were verified on a real-time co-simulation test bed. Our discoveries indicate the lack of user/vehicle verification and improper authorization for critical functions, which allow adversaries to remotely hijack charging sessions and launch attacks against the connected critical infrastructure. The attacks were demonstrated using the EVCS mobile applications showing the feasibility and the applicability of our attacks. Indeed, we discuss specific remote attack scenarios and their impact on EV users. More importantly, our analysis results demonstrate the feasibility of leveraging existing vulnerabilities across various EV charging mobile applications to perform wide-scale coordinated remote charging/discharging attacks against the connected critical infrastructure (e.g., power grid), with significant economical and operational implications. Finally, we propose countermeasures to secure the infrastructure and impede adversaries from performing reconnaissance and launching remote attacks using compromised accounts.

References

[2]
Linda Gyulai. 2020. Montreal’s climate plan includes ban on non-electric cars downtown by 2030. https://montrealgazette.com/news/local-news/montreal-releases-climate-plan-including-ban-on-non-electric-cars-downtown-by-2030
[3]
Charles Riley. 2021. Europe aims to kill gasoline and diesel cars by 2035. https://edition.cnn.com/2021/07/14/business/eu-emissions-climate-cars/index.html
[5]
Samrat Acharya, Yury Dvorkin, Hrvoje Pandžić, and Ramesh Karri. 2020. Cybersecurity of smart electric vehicle charging: A power grid perspective. IEEE Access 8 (2020), 214434–214453.
[6]
Mohammad Ali Sayed, Ribal Atallah, Chadi Assi, and Mourad Debbabi. 2021. Electric vehicle attack impact on power grid operation. International Journal of Electrical Power & Energy Systems 112 (2021), 107784. DOI:
[7]
Tony Nasr, Sadegh Torabi, Elias Bou-Harb, Claude Fachkha, and Chadi Assi. 2021. Power jacking your station: In-depth security analysis of electric vehicle charging station management systems. Computers & Security (2021), 102511.
[8]
R. Akhras, W. El-Hajj, M. Majdalani, H. Hajj, R. Jabr, and K. Shaban. 2020. Securing smart grid communication using ethereum smart contracts. International Wireless Communications and Mobile Computing (IWCMC’20). Limassol, Cyprus, 1672–1678. DOI:
[9]
Cristina Alcaraz, Javier Lopez, and Stephen Wolthusen. 2017. OCPP protocol: Security threats and challenges. IEEE Transactions on Smart Grid 8, 5 (2017), 2452–2459.
[10]
Juan E. Rubio, Cristina Alcaraz, and Javier Lopez. 2018. Addressing security in OCPP: Protection against man-in-the-middle attacks. In 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS’18). IEEE, 1–5.
[11]
Hossam ElHussini, Chadi Assi, Bassam Moussa, Ribal Atallah, and Ali Ghrayeb. 2021. A tale of two entities: Contextualizing the security of electric vehicle charging stations on the power grid. ACM Transactions on Internet of Things 2, 2 (2021), 1–21.
[12]
Joseph Antoun, Mohammad Ekramul Kabir, Bassam Moussa, Ribal Atallah, and Chadi Assi. 2020. A detailed security assessment of the EV charging ecosystem. IEEE Network 34, 3 (2020), 200–207.
[13]
Open Charge Alliance. 2021. OCPP 2.0.1, protocols, home. https://www.openchargealliance.org/protocols/ocpp-201/
[14]
Richard Baker and Ivan Martinovic. 2019. Losing the car keys: Wireless phy-layer insecurity in EV charging. In 28th USENIX Security Symposium (USENIX Security’19). 407–424.
[15]
Y. S. Wong, K. T. Chau, and C. C. Chan. 2006. Battery sizing for plug-in hybrid electric vehicles. Journal of Asian Electric Vehicles 4, 2 (2006), 899–904.
[16]
Kaspersky Lab. 2021. How do fuel cell electric vehicles work Using hydrogen?https://afdc.energy.gov/vehicles/how-do-fuel-cell-electric-cars-work
[18]
Juan E. Rubio, Cristina Alcaraz, and Javier Lopez. 2018. Addressing security in OCPP: Protection against man-in-the-middle attacks. In 2018 9th IFIP International Conference on New Technologies, Mobility and Security. 1–5.
[19]
Omniyah Gul M. Khan, Ehab El-Saadany, Amr Youssef, and Mostafa Shaaban. 2019. Impact of electric vehicles botnets on the power grid. In 2019 IEEE Electrical Power and Energy Conference (EPEC’19). IEEE, 1–5.
[20]
Kristien Clement-Nyns, Edwin Haesen, and Johan Driesen. 2009. The impact of charging plug-in hybrid electric vehicles on a residential distribution grid. IEEE Transactions on Power Systems 25, 1 (2009), 371–380.
[21]
Niels Leemput, Frederik Geth, Juan Van Roy, Annelies Delnooz, Jeroen Büscher, and Johan Driesen. 2014. Impact of electric vehicle on-board single-phase charging strategies on a flemish residential grid. IEEE Transactions on Smart Grid 5, 4 (2014), 1815–1822.
[22]
Anamika Dubey and Surya Santoso. 2015. Electric vehicle charging on residential distribution systems: Impacts and mitigations. IEEE Access 3 (2015), 1871–1893.
[23]
Hugo Morais, Tiago Sousa, Zita Vale, and Pedro Faria. 2014. Evaluation of the electric vehicle impact in the power demand curve in a smart grid environment. Energy Conversion and Management 82 (2014), 268–282.
[24]
Soroush Shafiee, Mahmud Fotuhi-Firuzabad, and Mohammad Rastegar. 2013. Investigating the impacts of plug-in hybrid electric vehicles on power distribution systems. IEEE Transactions on Smart Grid 4, 3 (2013), 1351–1360.
[25]
Elif Ustundag Soykan, Mustafa Bagriyanik, and Gurkan Soykan. 2021. Disrupting the power grid via EV charging: The impact of the SMS Phishing attacks. Sustainable Energy, Grids and Networks 26 (2021), 100477.
[26]
Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, and Yuqing Zhang. 2019. Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms. In 28th USENIX Security Symposium (USENIX Security’19). 1133–1150.
[28]
2021. apktool - a tool for reverse engineering 3rd party, closed, binary android apps.https://ibotpeaches.github.io/Apktool/
[29]
KALI. 2021. Dex2jar: Kali linux tools. https://www.kali.org/tools/dex2jar/
[30]
KALI. 2021. JD-Gui: Kali linux tools. https://www.kali.org/tools/jd-gui/
[31]
MobSF. 2021. Mobile security framework (mobsf). https://github.com/MobSF/Mobile-Security-Framework-MobSF
[32]
Pkumza. 2021. pkumza/LiteRadar: Lite version of LibRadar. https://github.com/pkumza/LiteRadar
[33]
Shengqian Yang, Dacong Yan, Haowei Wu, Yan Wang, and Atanas Rountev. 2015. Static control-flow analysis of user-driven callbacks in Android applications. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol. 1. IEEE, 89–99.
[34]
Tanzirul Azim and Iulian Neamtiu. 2013. Targeted and depth-first exploration for systematic testing of Android apps. In Proceedings of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications. 641–660.
[35]
GPS Joystick Guide-the app ninjas. n. d.http://gpsjoystick.theappninjas.com/
[36]
SHIVAM says. 2021. Virtualxposed APK 0.20.3 download latest in 2021 [official]. https://virtualxposed.com/
[37]
Ac-Pm. n.d. AC-PM/inspeckage: Android Package Inspector - Dynamic Analysis with API hooks, start unexported activities and more. (Xposed module). https://github.com/ac-pm/Inspeckage
[38]
Jens Schmutzler, Claus Amtrup Andersen, and Christian Wietfeld. 2021. Burp Suite - Application Security Testing Software. https://portswigger.net/burp
[39]
Jens Schmutzler, Claus Amtrup Andersen, and Christian Wietfeld. 2013. Evaluation of OCPP and IEC 61850 for smart charging electric vehicles. World Electric Vehicle Journal 6, 4 (2013), 863–874.
[40]
Jens Schmutzler, Christian Wietfeld, and Claus Amtrup Andersen. 2012. Distributed energy resource management for electric vehicles using IEC 61850 and ISO/IEC 15118. In 2012 IEEE Vehicle Power and Propulsion Conference. IEEE, 1457–1462.
[41]
Communication apis for SMS, Voice, Video & Authentication. [n. d.]https://www.twilio.com/
[42]
Yu-Wei Chung, Behnam Khaki, Tianyi Li, Chicheng Chu, and Rajit Gadh. 2019. Ensemble machine learning-based algorithm for electric vehicle user behavior prediction. Applied Energy 254 (2019), 113732.
[43]
Ahmad Almaghrebi, Subhaditya Shom, Fares Al Juheshi, Kevin James, and Mahmoud Alahmad. 2019. Analysis of user charging behavior at public charging stations. In 2019 IEEE Transportation Electrification Conference and Expo (ITEC’19). IEEE, 1–6.
[44]
Tai-Yu Ma and Sébastien Faye. 2022. Multistep electric vehicle charging station occupancy prediction using hybrid LSTM neural networks. Energy vol 244, part B (2022), 123217.
[45]
Zachary J. Lee, Tongxin Li, and Steven H. Low. 2019. ACN-data: Analysis and applications of an open EV charging dataset. In Proceedings of the 10th ACM International Conference on Future Energy Systems. 139–149.
[46]
Appium. 2021. Automation for Apps. https://appium.io/
[47]
Saleh Soltan, Prateek Mittal, and H. Vincent Poor. 2018. BlackIoT: IoT botnet of high wattage devices can disrupt the power grid. In 27th USENIX Security Symposium (USENIX Security’18). 15–32.
[48]
K. Sarieddine, M. A. Sayed, D. Jafarigiv, R. Atallah, M. Debbabi, and C. Assi. 2023. A real-time cosimulation testbed for electric vehicle charging and smart grid security. In IEEE Security & Privacy 21, 4 (2023), 74–83. DOI:
[49]
Yosra Fraiji, Lamia Ben Azzouz, Wassim Trojet, and Leila Azouz Saidane. 2018. Cyber security issues of Internet of electric vehicles. In 2018 IEEE Wireless Communications and Networking Conference (WCNC’18). IEEE, 1–6.
[50]
Richard M. Pratt and Thomas E. Carroll. 2019. Vehicle charging infrastructure security. In 2019 IEEE International Conference on Consumer Electronics (ICCE’19). IEEE, 1–5.
[52]
Australian Energy Market Operator (AEMOO). 2021. Demand Trend. https://aemo.com.au/en
[53]
Guido Cavraro, Andrey Bernstein, Vassilis Kekatos, and Yingchen Zhang. 2019. Real-time identifiability of power distribution network topologies with limited monitoring. IEEE Control Systems Letters 4, 2 (2019), 325–330.
[54]
Seyed Iman Taheri, M. B. C. Salles, and N. Kagan. 2019. A new modified TLBO algorithm for placement of AVRs in distribution system. In 2019 IEEE PES Innovative Smart Grid Technologies Conference-Latin America. IEEE, 1–6.
[55]
Guido Cavraro and Vassilis Kekatos. 2019. Inverter probing for power distribution network topology processing. IEEE Transactions on Control of Network Systems 6, 3 (2019), 980–992.
[56]
Keith Moffat, Mohini Bariya, and Alexandra Von Meier. 2019. Unsupervised impedance and topology estimation of distribution networks—limitations and tools. IEEE Transactions on Smart Grid 11, 1 (2019), 846–856.
[57]
Anandini Gandluru, Shiva Poudel, and Anamika Dubey. 2019. Joint estimation of operational topology and outages for unbalanced power distribution systems. IEEE Transactions on Power Systems 35, 1 (2019), 605–617.
[58]
Deepjyoti Deka, Michael Chertkov, and Scott Backhaus. 2019. Topology estimation using graphical models in multi-phase power distribution grids. IEEE Transactions on Power Systems 35, 3 (2019), 1663–1673.
[59]
Keith Moffat, Mohini Bariya, and Alexandra Von Meier. 2020. Real time effective impedance estimation for power system state estimation. In 2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT’20). IEEE, 1–5.
[60]
Prabha Kundur. 2007. Power system stability. Power System Stability and Control, (3rd edition), (2007), 7–1.
[61]
J. Duncan Glover, Mulukutla S. Sarma, and Thomas Overbye. 2012. Power System Analysis & Design, SI Version. Cengage Learning.
[63]
Bing Huang, Alvaro A. Cardenas, and Ross Baldick. 2019. Not everything is dark and gloomy: Power grid protections against IoT demand attacks. In 28th USENIX Security Symposium (USENIX Security’19). 1115–1132.
[64]
M. E. Kabir, M. Ghafouri, B. Moussa, and C. Assi. 2021. A two-stage protection method for detection and mitigation of coordinated EVSE switching attacks. In IEEE Transactions on Smart Grid 12, 5 (2021), 4377–4388. DOI:
[66]
Smartcar · API platform for Connected Car Data. n.d.https://smartcar.com/

Cited By

View all
  • (2025)Supervised Machine Learning for Real-Time Intrusion Attack Detection in Connected and Autonomous Vehicles: A Security Paradigm ShiftInformatics10.3390/informatics1201000412:1(4)Online publication date: 6-Jan-2025
  • (2025)Real-Time Adaptive and Lightweight Anomaly Detection Based on a Chaotic System in Cyber–Physical SystemsElectronics10.3390/electronics1403059814:3(598)Online publication date: 3-Feb-2025
  • (2025)Intelligent Monitoring Systems for Electric Vehicle ChargingApplied Sciences10.3390/app1505274115:5(2741)Online publication date: 4-Mar-2025
  • Show More Cited By

Index Terms

  1. Investigating the Security of EV Charging Mobile Applications as an Attack Surface

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Cyber-Physical Systems
    ACM Transactions on Cyber-Physical Systems  Volume 7, Issue 4
    October 2023
    199 pages
    ISSN:2378-962X
    EISSN:2378-9638
    DOI:10.1145/3627765
    • Editor:
    • Chenyang Lu
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 14 October 2023
    Online AM: 28 July 2023
    Accepted: 01 July 2023
    Revised: 24 May 2023
    Received: 26 February 2023
    Published in TCPS Volume 7, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Electric vehicle charging
    2. cyber-physical systems
    3. security analysis
    4. mobile application

    Qualifiers

    • Research-article

    Funding Sources

    • Concordia University/Hydro-Quebec/NSERC
    • Large-scale Integration of EVCSs into the Smart Grid: A Comprehensive Cyber-physical Study and Security Assessment

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)571
    • Downloads (Last 6 weeks)64
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Supervised Machine Learning for Real-Time Intrusion Attack Detection in Connected and Autonomous Vehicles: A Security Paradigm ShiftInformatics10.3390/informatics1201000412:1(4)Online publication date: 6-Jan-2025
    • (2025)Real-Time Adaptive and Lightweight Anomaly Detection Based on a Chaotic System in Cyber–Physical SystemsElectronics10.3390/electronics1403059814:3(598)Online publication date: 3-Feb-2025
    • (2025)Intelligent Monitoring Systems for Electric Vehicle ChargingApplied Sciences10.3390/app1505274115:5(2741)Online publication date: 4-Mar-2025
    • (2025)Developing a Security Metric for Assessing the Power Grid’s Posture Against Attacks From EV Charging EcosystemIEEE Transactions on Smart Grid10.1109/TSG.2024.345197016:1(254-276)Online publication date: Jan-2025
    • (2025)Designing a Security Metric for EV-Based Load-Altering Attacks in Transmission SystemsIEEE Transactions on Instrumentation and Measurement10.1109/TIM.2024.349706274(1-18)Online publication date: 2025
    • (2025)Secure and convenience charging communication between electric vehicle and charging station with plug and chargeElectric Power Systems Research10.1016/j.epsr.2024.111371241(111371)Online publication date: Apr-2025
    • (2025)Secure Communication in Vehicle-to-Grid Networks: A Study on Man in the Middle Attack MitigationEmerging Electronics and Automation10.1007/978-981-97-6802-8_8(85-99)Online publication date: 6-Feb-2025
    • (2024)Off-Grid Electric Vehicle Charging Station with Integrated Local Server OCPP Protocol as a Management SystemTransport and Telecommunication Journal10.2478/ttj-2024-002425:3(321-334)Online publication date: 26-Jun-2024
    • (2024)Smart, Secure and Interoperable Charging Infrastructure with Plug and Charge2024 12th International Conference on Smart Grid (icSmartGrid)10.1109/icSmartGrid61824.2024.10578287(174-180)Online publication date: 27-May-2024
    • (2024)Charge Manipulation Attacks Against Smart Electric Vehicle Charging Stations and Deep Learning-Based Detection MechanismsIEEE Transactions on Smart Grid10.1109/TSG.2024.340109015:5(5182-5194)Online publication date: Sep-2024
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media