[Resource Topic] 2023/1078: Bypassing Android isolation with fuel gauges: new risks with advanced power ICs

Welcome to the resource topic for 2023/1078

Title:
Bypassing Android isolation with fuel gauges: new risks with advanced power ICs

Authors: Vincent Giraud, David Naccache

Abstract:

Efficient power management is critical for embedded devices, both for extending their lifetime and ensuring safety. However, this can be a challenging task due to the unpredictability of the batteries commonly used in such devices. To address this issue, dedicated Integrated Circuits known as “fuel gauges” are often employed outside of the System-On-Chip. These devices provide various metrics about the available energy source and are highly accurate. However, their precision can also be exploited by malicious actors to compromise platform confidentiality if the Operating System fails to intervene. Depending on the fuel gauge and OS configuration, several attack scenarios are possible. In this article, we focus on Android and demonstrate how it is possible to bypass application isolation to recover PINs entered in other processes.

ePrint: https://eprint.iacr.org/2023/1078

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .