This research serves as an initial stage into the exploration of side-channel attacks and defensive mitigations for non-network, wireless, point-to-point communications systems
IDENTIFY
What vulnerabilities exist within systems via wireless power transfer; how can these vulnerabilities be exploited and defended against?
APPLY
The initial phase of this research includes the reproduction and expansion of research related to injection based hijacking of the charging process and non-intrusive eavesdropping of the charging process allowing for interpreted analysis of device activity.
EXPAND
This serves as the initial point of research to be provided to the National Reconnaissance Office (NRO) and help observe various other methods of similar side-channel attacks such as taking advantage of point-to-point communication capabilities.
- Quinn Henry
- Cole Hermanson
- Nathan Pak
- Alexander Singh