1. Introduction

Wireless charging, epitomized by the widespread Qi standard, has been marketed as a secure and convenient alternative to wired charging, largely immune to data-based attacks that plague USB connections. The VoltSchemer research shatters this assumption, revealing a fundamental vulnerability in the power delivery chain itself. This paper demonstrates that by modulating the voltage supplied to a Commercial Off-The-Shelf (COTS) wireless charger, an attacker can induce intentional electromagnetic interference (IEMI) that manipulates the charger's operation, bypassing its security protocols and enabling a suite of powerful physical and cyber-physical attacks.

2. Background & Threat Model

Understanding VoltSchemer requires a grasp of the Qi ecosystem's perceived security and the novel threat model introduced.

2.1 Qi Wireless Charging Standard

The Qi standard by the Wireless Power Consortium (WPC) uses near-field magnetic induction for power transfer. Security is enforced through in-band communication, where the charger and device exchange control packets by modulating the power signal itself. Critical safety features include Foreign Object Detection (FOD) to prevent heating of metallic objects and negotiated power levels to prevent overcharging.

2.2 Attack Model & Assumptions

The attacker's goal is to subvert the wireless charger's intended behavior. The core assumption is that the attacker can control or replace the power adapter (AC-DC converter) supplying the charger. This is a realistic threat in public spaces (airports, cafes) or via compromised/ malicious charging stations. No physical modification to the charger or device is required.

3. The VoltSchemer Attack Methodology

VoltSchemer exploits the non-ideal isolation between the power input and the transmitter coil's control circuitry.

3.1 Voltage Noise Injection Vector

The attacker generates a carefully crafted voltage noise signal $V_{noise}(t)$ and superimposes it onto the DC supply voltage $V_{dc}$ using a purpose-built circuit. This noisy supply $V_{supply}(t) = V_{dc} + V_{noise}(t)$ is fed to the wireless charger. Due to electromagnetic interference (EMI) and power supply rejection ratio (PSRR) limitations in the charger's circuitry, this noise propagates to and modulates the current in the transmitter coil.

3.2 Exploiting In-Band Communication

Qi communication relies on amplitude modulation of the power signal. By shaping $V_{noise}(t)$, the attacker can mimic or overwrite legitimate communication packets. The injected noise creates sideband frequencies that interfere with the demodulation process at the receiver (phone), allowing the injection of malicious Qi packets or the disruption of legitimate ones.

3.3 Technical Details & Mathematical Model

The attack can be modeled as a signal injection problem. The transmitter coil current $I_{tx}(t)$ is a function of the driver circuit's input, which is corrupted by the supply noise. A simplified representation: $I_{tx}(t) = f(V_{dc} + \alpha \cdot V_{noise}(t), C(t))$, where $f$ is the charger's transfer function, $\alpha$ is the coupling coefficient representing noise susceptibility, and $C(t)$ are legitimate control signals. The attacker designs $V_{noise}(t)$ to achieve a desired malicious $I_{tx}(t)$ that corresponds to forged Qi messages (e.g., "FOD passed", "increase power").

4. Demonstrated Attack Vectors

The research concretizes the threat through three practical attacks.

Attack Success Rate

9/9

Top-selling COTS chargers vulnerable

Key Impact

3

Distinct, high-severity attack vectors demonstrated

4.1 Inaudible Voice Command Injection

The modulated magnetic field can induce tiny voltages in a smartphone's internal audio circuitry. By encoding voice commands in the ultrasonic range (>20 kHz), VoltSchemer can trigger voice assistants (Google Assistant, Siri) without user awareness, leading to device compromise, data exfiltration, or smart home control.

4.2 Device Damage via Overcharging/Overheating

By forging Qi communication packets, the attacker can instruct the charger to ignore the device's "End Power Transfer" signal or to deliver power beyond negotiated limits. This can cause severe battery degradation, swelling, or in extreme cases, thermal runaway and fire.

4.3 Bypassing Foreign Object Detection (FOD)

This is the most insidious attack. FOD is a critical safety feature that detects parasitic power loss (e.g., to a coin or key) and shuts down. VoltSchemer can inject packets that falsely report high power transfer efficiency, tricking the charger into operating at full power with a foreign object present, creating an intense localized heating hazard.

5. Experimental Results & Evaluation

5.1 Test Setup & Devices

The team tested 9 best-selling Qi chargers from brands like Anker, Belkin, and Samsung. The attack setup consisted of a programmable power supply to generate $V_{noise}(t)$, the target charger, and various victim devices (smartphones, key fobs, USB drives).

5.2 Success Rates & Impact Metrics

All 9 chargers were susceptible to at least one attack vector. Voice command injection succeeded on devices placed on the charger. Overcharging attacks were able to force continuous charging cycles. FOD bypass was successfully demonstrated, heating a house key to over 280°C (536°F) in minutes—a clear fire ignition risk.

5.3 Charts & Data Visualization

Figure 1: Temperature Rise during FOD Bypass Attack. A line chart would show time on the X-axis and temperature (°C) on the Y-axis. The line for a metal object (e.g., a key) would show a steep, near-linear increase from room temperature to over 280°C within 3-5 minutes when the FOD is bypassed, while the line for a legitimate charging session would remain flat or show a mild increase.

Figure 2: Voltage Noise Spectrum for Command Injection. A frequency-domain plot showing the attacker's injected noise signal $V_{noise}(f)$. Peaks would be visible in the ultrasonic band (e.g., 20-24 kHz), corresponding to the modulated voice command, alongside lower-frequency components used to manipulate Qi packet timing.

6. Analysis Framework & Case Example

Case: Public Charging Station Compromise. An attacker replaces the power adapter in a public wireless charging pad at an airport with a malicious one. The adapter appears normal but contains a microcontroller that generates VoltSchemer signals.

  1. Reconnaissance: The adapter passively monitors power draw to identify when a smartphone is placed on the pad.
  2. Exploitation: Upon detection, it executes a pre-programmed attack sequence: 1) Bypass FOD to enable full power. 2) Inject an inaudible voice command: "Hey Google, text my last photo to [attacker's number]."
  3. Impact: User privacy is breached. Simultaneously, the sustained high-power transfer with the phone present increases device temperature, causing discomfort and potential battery stress.

This framework highlights the multi-vector, automated potential of the attack in a real-world scenario.

7. Countermeasures & Mitigation Strategies

The paper suggests several defenses:

  • Enhanced Power Supply Filtering: Implementing more robust EMI filters and regulators on the charger's input to attenuate high-frequency noise.
  • Out-of-Band Authentication: Adding a separate, authenticated communication channel (e.g., NFC, Bluetooth Low Energy) for critical safety signals like FOD status, as proposed in some academic works on securing cyber-physical systems.
  • Signal Integrity Checks: Implementing consistency checks in the Qi communication protocol to detect unnatural signal modulations that indicate tampering.
  • Physical Tamper Evidence: For public installations, securing power adapters to prevent easy replacement.

8. Future Applications & Research Directions

VoltSchemer opens a new domain of hardware security research:

  • Expanded Target Analysis: Applying similar principles to other contactless power/communication systems (e.g., RFID, NFC, electric vehicle wireless charging). The fundamental issue of supply noise coupling may be widespread.
  • AI-Driven Attack Synthesis: Using reinforcement learning to discover optimal $V_{noise}(t)$ waveforms for new charger models automatically, reducing the need for manual reverse engineering.
  • Standardization Push: This work provides critical data to standards bodies like the WPC to mandate stricter power supply noise immunity (PSRR) and signal authentication in future Qi specifications (e.g., Qi v3.0).
  • Defensive Tool Development: Creating diagnostic tools that can scan a wireless charger's susceptibility to voltage noise injection, similar to software vulnerability scanners.

9. References

  1. Zhan, Z., Yang, Y., Shan, H., Wang, H., Jin, Y., & Wang, S. (2024). VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger. arXiv preprint arXiv:2402.11423.
  2. Wireless Power Consortium. (2023). Qi Wireless Power Transfer System Specification. Retrieved from https://www.wirelesspowerconsortium.com
  3. Zhang, K., et al. (2019). PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines. IEEE Transactions on Information Forensics and Security.
  4. Guri, M. (2020). Power-Supplay: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers. IEEE Access.
  5. NIST. (2020). Framework for Cyber-Physical Systems. National Institute of Standards and Technology. Retrieved from https://www.nist.gov/el/cyber-physical-systems

10. Expert Analysis & Critical Review

Core Insight

VoltSchemer isn't just another bug; it's a systemic failure in the security model of wireless charging. The industry's myopic focus on defending the data path (removed in wireless) blinded it to the physical power path as an attack vector. This research proves that in cyber-physical systems, any energy channel can be weaponized for communication and control—a principle echoed in earlier works like PowerHammer (exfiltration via power lines) but now applied destructively to safety-critical hardware. The assumption that "no direct connection equals higher security" has been decisively debunked.

Logical Flow

The attack logic is elegant in its simplicity: 1) Identify the Channel: The DC power input is a trusted, unauthenticated conduit. 2) Exploit Coupling: Leverage inevitable analog imperfections (EMI, poor PSRR) to translate voltage noise into magnetic field modulation. 3) Subvert the Protocol: Map this control over the magnetic field onto the in-band communication layer of the Qi standard. 4) Execute Payloads: Use this control to violate the three core guarantees of wireless charging: data isolation, negotiated power transfer, and foreign object safety. The flow from physical phenomenon to protocol breach is seamless and terrifyingly effective.

Strengths & Flaws

Strengths: The research is exceptionally practical. Attacking 9 COTS devices demonstrates immediate, real-world relevance, not just theoretical risk. The multi-vector demonstration (privacy, integrity, safety) shows comprehensive impact. The attack requires no device-side exploit, making it scalable.

Flaws & Open Questions: While the proof-of-concept is solid, the paper underplays the attacker's need for precise charger-specific tuning. The "malicious power adapter" must be engineered for a specific charger model's noise susceptibility ($\alpha$), which requires reverse-engineering. How scalable is this in practice against a diverse ecosystem? Furthermore, the discussion of countermeasures is preliminary. Would out-of-band authentication, as suggested, simply add cost and complexity, or is it the only viable long-term fix? The paper could engage more deeply with the economic and standardization hurdles to mitigation.

Actionable Insights

For the industry, the time for complacency is over. Manufacturers must immediately audit their designs for power supply noise immunity, treating the DC input as a potential attack surface. Component-level hardening with better filters is a non-negotiable short-term fix. The Wireless Power Consortium (WPC) must treat this as a critical-path issue for the next Qi specification. Mandating signal authentication or integrity checks for FOD and power control packets is essential. Relying solely on in-band communication for safety is now proven flawed. Enterprise & Public Venue Operators should audit public charging stations, ensuring power adapters are physically secured and considering a move towards user-provided power (e.g., USB-C PD) for public charging pads. As an analyst, I predict regulatory scrutiny will follow; the CPSC (Consumer Product Safety Commission) and equivalent bodies globally will take note of the fire hazard demonstrated. VoltSchemer has redrawn the attack surface map for the IoT world—ignoring it is a profound liability.