Skip to content
/ WPT Public

Side Channel Attacks and Exploit Mitigations of Wireless Power Transfer (WPT) Qi Protocol

Notifications You must be signed in to change notification settings

pr1or1tyQ/WPT

Repository files navigation

Wireless Power Transfer

Research on WPT Side-channel Attacks and Exploit Mitigations of the Qi Wireless Charging Protocol

This research serves as an initial stage into the exploration of side-channel attacks and defensive mitigations for non-network, wireless, point-to-point communications systems


Problem Statement

IDENTIFY

What vulnerabilities exist within systems via wireless power transfer; how can these vulnerabilities be exploited and defended against?

APPLY

The initial phase of this research includes the reproduction and expansion of research related to injection based hijacking of the charging process and non-intrusive eavesdropping of the charging process allowing for interpreted analysis of device activity.

EXPAND

This serves as the initial point of research to be provided to the National Reconnaissance Office (NRO) and help observe various other methods of similar side-channel attacks such as taking advantage of point-to-point communication capabilities.


Authors

  • Quinn Henry
  • Cole Hermanson
  • Nathan Pak
  • Alexander Singh

About

Side Channel Attacks and Exploit Mitigations of Wireless Power Transfer (WPT) Qi Protocol

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published