Loading [MathJax]/extensions/MathMenu.js
Marionette: Manipulate Your Touchscreen via a Charging Cable | IEEE Journals & Magazine | IEEE Xplore

Marionette: Manipulate Your Touchscreen via a Charging Cable


Abstract:

The security of capacitive touchscreens is crucial since they have become the primary human-machine interface on smart devices. This paper presents Marionette, the first ...Show More

Abstract:

The security of capacitive touchscreens is crucial since they have become the primary human-machine interface on smart devices. This paper presents Marionette, the first wired attack that creates ghost touches on capacitive touchscreens via charging cables and can manipulate the victim's devices with undesired consequences, e.g., establishing malicious Bluetooth connections. Our study provides a new threat vector against touchscreens that only requires connecting to a malicious charging port, which could be a public charging station, and is effective across various USB data blockers and power adapters. Despite the fact that smartphones employ abundant noise reduction and voltage management techniques, we manage to inject carefully crafted signals that can induce ghost touches within a chosen range. The underlying principle is to inject common-mode noises over the power line to avoid being effectively filtered yet affecting the touch measurement mechanism and synchronize the malicious noise with the screen measurement scanning cycles to place the ghost touches at target locations. We achieve three types of attacks, i.e., injection, alteration, and Denial-of-Service, and the evaluation of 12 commercial electronics, 6 power adapters, and 13 charging cables demonstrate the feasibility of Marionette.
Published in: IEEE Transactions on Dependable and Secure Computing ( Volume: 21, Issue: 4, July-Aug. 2024)
Page(s): 3309 - 3323
Date of Publication: 20 October 2023

ISSN Information:

Funding Agency:

No metrics found for this document.

I. Introduction

Capacitive touchscreens have been widely used in consumer electronic devices, e.g., smartphones, tablets, and even vehicles [1], [2]. Reliable touch operation becomes critical not only for usability but also for security. “Ghost Touch” has been reported in recent news, in which the touchscreen outputs fake touches and starts to control the smart device by itself yet the user does not impose any physical contacts on the screen at all [3], [4], [5], [6]. In one case [6], a charging smartphone was controlled by ghost touches and booked a presidential suite that cost more than a thousand dollars while the user was not aware of it. To the best of our knowledge, the phenomenon that controlled ghost touches appear on the charging devices has not been studied before, so it motivates us to dig into the trustworthiness of capacitive touchscreens under conducted EMI and their security implication on the victim devices.

Usage
Select a Year
2025

View as

Total usage sinceOct 2023:468
010203040JanFebMarAprMayJunJulAugSepOctNovDec213426000000000
Year Total:81
Data is updated monthly. Usage includes PDF downloads and HTML views.
Contact IEEE to Subscribe

References

References is not available for this document.