{"id":"https://openalex.org/W4414458659","doi":"https://doi.org/10.1109/tdsc.2025.3614253","title":"Charging Into Your Privacy: Indirect Privacy Leakage Attack Using a Laptop Charger","display_name":"Charging Into Your Privacy: Indirect Privacy Leakage Attack Using a Laptop Charger","publication_year":2025,"publication_date":"2025-09-24","ids":{"openalex":"https://openalex.org/W4414458659","doi":"https://doi.org/10.1109/tdsc.2025.3614253"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3614253","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3614253","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Nahyun Kim","orcid":"https://orcid.org/0009-0004-6700-5815"},"institutions":[{"id":"https://openalex.org/I98600543","display_name":"Seoul Women's University","ror":"https://ror.org/04b2fhx54","country_code":"KR","type":"education","lineage":["https://openalex.org/I98600543"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Nahyun Kim","raw_affiliation_strings":["Seoul Women&#x2019;s University, Seoul, South Korea","Seoul Women&#x0027;s University, Seoul, Republic of Korea"],"raw_orcid":"https://orcid.org/0009-0004-6700-5815","affiliations":[{"raw_affiliation_string":"Seoul Women&#x2019;s University, Seoul, South Korea","institution_ids":["https://openalex.org/I98600543"]},{"raw_affiliation_string":"Seoul Women&#x0027;s University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I98600543"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052734232","display_name":"Hanseul Jung","orcid":"https://orcid.org/0009-0002-8374-1279"},"institutions":[{"id":"https://openalex.org/I98600543","display_name":"Seoul Women's University","ror":"https://ror.org/04b2fhx54","country_code":"KR","type":"education","lineage":["https://openalex.org/I98600543"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hanseul Jung","raw_affiliation_strings":["Seoul Women&#x2019;s University, Seoul, South Korea","Seoul Women&#x0027;s University, Seoul, Republic of Korea"],"raw_orcid":"https://orcid.org/0009-0002-8374-1279","affiliations":[{"raw_affiliation_string":"Seoul Women&#x2019;s University, Seoul, South Korea","institution_ids":["https://openalex.org/I98600543"]},{"raw_affiliation_string":"Seoul Women&#x0027;s University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I98600543"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Minyoung Choi","orcid":"https://orcid.org/0009-0001-4388-3769"},"institutions":[{"id":"https://openalex.org/I98600543","display_name":"Seoul Women's University","ror":"https://ror.org/04b2fhx54","country_code":"KR","type":"education","lineage":["https://openalex.org/I98600543"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Minyoung Choi","raw_affiliation_strings":["Seoul Women&#x2019;s University, Seoul, South Korea","Seoul Women&#x0027;s University, Seoul, Republic of Korea"],"raw_orcid":"https://orcid.org/0009-0001-4388-3769","affiliations":[{"raw_affiliation_string":"Seoul Women&#x2019;s University, Seoul, South Korea","institution_ids":["https://openalex.org/I98600543"]},{"raw_affiliation_string":"Seoul Women&#x0027;s University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I98600543"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109258933","display_name":"J. M. Bak","orcid":null},"institutions":[{"id":"https://openalex.org/I98600543","display_name":"Seoul Women's University","ror":"https://ror.org/04b2fhx54","country_code":"KR","type":"education","lineage":["https://openalex.org/I98600543"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jeongmin Bak","raw_affiliation_strings":["Seoul Women&#x2019;s University, Seoul, South Korea","Seoul Women&#x0027;s University, Seoul, Republic of Korea"],"raw_orcid":"https://orcid.org/0009-0003-7185-6121","affiliations":[{"raw_affiliation_string":"Seoul Women&#x2019;s University, Seoul, South Korea","institution_ids":["https://openalex.org/I98600543"]},{"raw_affiliation_string":"Seoul Women&#x0027;s University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I98600543"]}]},{"author_position":"last","author":{"id":null,"display_name":"Sun Woo Lee","orcid":"https://orcid.org/0000-0001-5216-0266"},"institutions":[{"id":"https://openalex.org/I98600543","display_name":"Seoul Women's University","ror":"https://ror.org/04b2fhx54","country_code":"KR","type":"education","lineage":["https://openalex.org/I98600543"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sun Woo Lee","raw_affiliation_strings":["Seoul Women&#x2019;s University, Seoul, South Korea","Seoul Women&#x0027;s University, Seoul, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0001-5216-0266","affiliations":[{"raw_affiliation_string":"Seoul Women&#x2019;s University, Seoul, South Korea","institution_ids":["https://openalex.org/I98600543"]},{"raw_affiliation_string":"Seoul Women&#x0027;s University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I98600543"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I98600543"],"apc_list":null,"apc_paid":null,"fwci":1.2753,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83320534,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"23","issue":"1","first_page":"1148","last_page":"1159"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9771999716758728,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/laptop","display_name":"Laptop","score":0.8604000210762024},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5853999853134155},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.541100025177002},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.46480000019073486},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4447999894618988},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.39169999957084656},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.3831999897956848},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.37119999527931213},{"id":"https://openalex.org/keywords/microcode","display_name":"Microcode","score":0.3686000108718872}],"concepts":[{"id":"https://openalex.org/C2780008327","wikidata":"https://www.wikidata.org/wiki/Q3962","display_name":"Laptop","level":2,"score":0.8604000210762024},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7961000204086304},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5853999853134155},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.541100025177002},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.46480000019073486},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4616999924182892},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4447999894618988},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.43880000710487366},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.39169999957084656},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.3831999897956848},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.37119999527931213},{"id":"https://openalex.org/C22174128","wikidata":"https://www.wikidata.org/wiki/Q175869","display_name":"Microcode","level":2,"score":0.3686000108718872},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.3675000071525574},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.3625999987125397},{"id":"https://openalex.org/C2984118289","wikidata":"https://www.wikidata.org/wiki/Q29954","display_name":"Power consumption","level":3,"score":0.36169999837875366},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3598000109195709},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33799999952316284},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.32659998536109924},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.31610000133514404},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.30720001459121704},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.30720001459121704},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.28760001063346863},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.28450000286102295},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.28290000557899475},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.2808000147342682},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.27559998631477356},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.27149999141693115},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.26589998602867126},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.25130000710487366}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3614253","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3614253","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W110155494","https://openalex.org/W2295760285","https://openalex.org/W2405148462","https://openalex.org/W2533043266","https://openalex.org/W2563009067","https://openalex.org/W2625110865","https://openalex.org/W2751592946","https://openalex.org/W2957423437","https://openalex.org/W3164146938","https://openalex.org/W4200426111","https://openalex.org/W4243150065","https://openalex.org/W4285228252","https://openalex.org/W4384948735","https://openalex.org/W4387212335","https://openalex.org/W4387227545","https://openalex.org/W4387359349","https://openalex.org/W4400762160"],"related_works":[],"abstract_inverted_index":{"Can":[0],"an":[1,12,84,161],"everyday":[2,212],"peripheral":[3,193],"device,":[4],"such":[5],"as":[6,11,197],"a":[7,29,48,97],"laptop":[8,49,62,120],"charger,":[9,50,122],"function":[10],"indirect":[13],"side":[14],"channel":[15],"through":[16],"which":[17],"private":[18],"user":[19,53],"activities":[20],"are":[21],"exposed?":[22],"In":[23],"this":[24,35],"paper,":[25],"we":[26,171],"propose":[27],"PrivateCharger,":[28],"novel":[30],"side-channel":[31],"attack":[32,81],"that":[33,67,190],"affirms":[34],"possibility.":[36],"By":[37],"analyzing":[38],"subtle":[39],"variations":[40],"in":[41,176,211],"the":[42,61,80,101,119,125,173,204],"magnetic":[43],"field":[44],"signals":[45],"emitted":[46],"by":[47],"PrivateCharger":[51,107],"infers":[52],"activity":[54],"without":[55],"requiring":[56],"any":[57],"physical":[58],"access":[59],"to":[60,83,118,127],"itself.":[63],"Unlike":[64],"prior":[65],"work":[66],"targets":[68],"internal":[69],"components":[70],"via":[71],"power":[72,145],"consumption":[73],"or":[74,121],"electromagnetic":[75],"emissions,":[76],"our":[77,135],"approach":[78],"shifts":[79],"vector":[82],"external":[85],"and":[86,129,143,156,183],"previously":[87],"overlooked":[88],"component\u2014the":[89],"charger.":[90],"This":[91],"redirection":[92],"enables":[93],"stealthy":[94],"inference":[95],"from":[96],"distance,":[98],"even":[99],"outside":[100],"user's":[102],"line":[103],"of":[104,163,207],"sight.":[105],"Importantly,":[106],"operates":[108],"using":[109],"only":[110],"commercially":[111],"available":[112],"devices,":[113],"with":[114,139],"no":[115],"hardware":[116,141],"modifications":[117],"significantly":[123],"lowering":[124],"barrier":[126],"execution":[128],"enhancing":[130],"real-world":[131,178],"applicability.":[132],"We":[133],"evaluate":[134],"method":[136],"across":[137],"laptops":[138],"diverse":[140],"architectures":[142],"charger":[144],"ratings,":[146],"achieving":[147],"high":[148],"recognition":[149],"accuracy\u2014especially":[150],"at":[151],"battery":[152],"levels":[153],"between":[154],"50%":[155],"80%,":[157],"where":[158],"it":[159],"reaches":[160],"average":[162],"84.6%":[164],"on":[165],"two":[166],"MacBook":[167],"Pro":[168],"models.":[169],"Furthermore,":[170],"demonstrate":[172],"attack's":[174],"robustness":[175],"complex":[177],"conditions,":[179],"including":[180],"multi-charger":[181],"environments":[182],"concurrent":[184],"application":[185],"scenarios.":[186],"These":[187],"findings":[188],"reveal":[189],"seemingly":[191],"innocuous":[192],"devices":[194],"can":[195],"serve":[196],"covert":[198],"conduits":[199],"for":[200],"privacy":[201],"leakage,":[202],"expanding":[203],"threat":[205],"landscape":[206],"passive":[208],"sidechannel":[209],"attacks":[210],"computing":[213],"environments.":[214]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-01-19T04:01:09.351973","created_date":"2025-10-10T00:00:00"}
