Stealth Attack Drains Cell Phone Batteries

Aug 24, 2006

Cell phones that can send or receive multimedia files could be targeted by an attack that stealthily drains their batteries, leaving cellular communications networks useless, according to computer security researchers at UC Davis.

"Battery power is the bottleneck for a cell phone," said Hao Chen, assistant professor of computer science at UC Davis. "It can't do anything with a dead battery." Cell phones are designed to conserve battery life by spending most of their time in standby mode.

Chen, and graduate students Denys Ma and Radmilo Racic, found that the MMS protocol, which allows cell phones to send and receive pictures, video and audio files, can be used to send packets of junk data to a cell phone. Every time the phone receives one of these packets, it "wakes up" from standby mode, but quickly discards the junk packet without ringing or alerting the user. Deprived of sleep by repeated pulses of junk data, the phone's batteries run down up to 20 times faster than in regular use.

The attacker needs to know the number and Internet address of the victim's cell phone, but those are easy to obtain, Chen said. The computer used to launch the attack could be anywhere on the Internet.

Chen and his students have tested the concept in the laboratory. They have also found other vulnerabilities in the MMS protocol -- one, for example, would allow users to circumvent billing for multimedia services and send files for free.

As cell phone providers offer more services, such as e-mail, Web surfing and file sharing, they become vulnerable to the same attacks as computers, as well as to new types of attack that exploit their specific vulnerabilities.

"It's important to evaluate security now, while cell phones are being connected to the broadband Internet," Chen said.

The work was presented at the 15th USENIX security symposium, July 31-Aug. 4 in Vancouver, Canada, and will be presented at IEEE Securecomm '06 in Baltimore, Md., Aug. 28-Sept. 1. The researchers notified service providers about the potential vulnerability before publishing their findings.

Source: UC Davis

Explore further: Scientists twist radio beams to send data: Transmissions reach speeds of 32 gigabits per second

add to favorites email to friend print save as pdf

Related Stories

CloudFlare tackles lost SSL key risk with Keyless SSL

Sep 19, 2014

Organizations looking for and concerned about optimal security protection are the targets of a new service announced by San Francisco-based CloudFlare. The offering is called Keyless SSL. CloudFlare explained ...

NREL bolsters batteries with nanotubes

Jul 01, 2014

Researchers at the Energy Department's National Renewable Energy Laboratory (NREL) are turning to extremely tiny tubes and rods to boost power and durability in lithium-ion batteries, the energy sources for ...

BART ready for renewed protests after cyber attack

Aug 15, 2011

(AP) -- San Francisco's mass transit system prepared for renewed protests Monday, a day after hackers angry over blocked cell phone service at some transit stations broke into a website and posted company ...

Hacker drone launches airborne cyber attacks

Aug 06, 2011

Computer security specialists showed off a homemade drone aircraft Friday capable of launching airborne cyber attacks, hijacking mobile phone calls, or even delivering a dirty bomb.

Recommended for you

Big new iPhone brings Apple more profit

3 hours ago

Apple's largest iPhone is selling for $100 more than its other new model, but a new report says it costs Apple only $15.50 more to make the more expensive version.

Microsoft to launch Xbox One in China in days

6 hours ago

US technology giant Microsoft will launch its Xbox One in China on September 29, becoming the first game console to enter the market in 14 years, it said Tuesday, in an apparent reversal of a delay announced ...

PlayStation TV to hit US in October

6 hours ago

PlayStation TV home entertainment system is set to hit North America on October 14 as Sony seeks to improve its financial footing with games, films and music.

User comments : 0