info@evworld.com
04 Aug 2025

Your EV's Battery Is Spying On You, New Study Reveals - EVWorld


By EVWorld.com Si Editorial Team

Public EV charger in China
Chinese researchers have uncovered a way to track an EVs movements based on its public charging cycle.

By EVWorld Si | August 4, 2025

A groundbreaking study has uncovered a profound privacy vulnerability in electric vehicles, showing that the unique way your car's battery uses electricity can be used to track your movements. The research demonstrates a novel, low-cost method for hackers to determine an EV's precise driving routes, including sensitive locations like home and work, simply by "listening" to its power draw during charging.

The paper, titled "Attacking Electric Vehicle Batteries," comes from a team of researchers at China's prestigious **Tsinghua, Zhejiang, and Sichuan Universities**, and it exposes a threat vector that goes beyond traditional software hacking.

The 'Power Fingerprint' Attack

The core of the vulnerability lies in what the researchers call a "power fingerprint." Every action a vehicle takes—accelerating, braking, cruising uphill or downhill—creates a distinct and measurable pattern in how it draws power from its battery. These fingerprints are so unique that, when analyzed, they correspond to the specific topographical and speed characteristics of a given road segment.

By capturing and analyzing these electrical signals, the researchers were able to train a machine learning model to identify these patterns. They could then match a sequence of these fingerprints to a map, effectively reconstructing the vehicle's journey with a high degree of accuracy.

A Low-Cost and Scalable Threat

Perhaps the most alarming aspect of the research is how this attack can be carried out. It does not require hacking the car's complex internal computers. Instead, the researchers demonstrated that the necessary data can be collected with simple, off-the-shelf equipment attached to a public AC charger.

This "side-channel" attack means a malicious actor could compromise a charging station in a parking garage or public space and passively collect the power fingerprint data from every EV that plugs in. This makes the threat highly scalable and difficult for an individual EV owner to detect.

Implications for Owners and the Industry

This study reveals a new frontier in automotive cybersecurity. While much focus has been placed on protecting a car's infotainment and control software, this research shows that hardware-level information from the battery management system (BMS) can be just as sensitive.

For EV owners, it's a stark reminder that physical connections, like charging, can be potential security risks. For automakers and BMS manufacturers, it is a call to action. They must now consider how to protect this electrical data, potentially by masking the power signatures or encrypting the data flow between the BMS and the charger to prevent this kind of electronic eavesdropping.

This pioneering work makes it clear that securing the electric vehicle ecosystem requires a holistic approach, protecting not just the car's brain, but its heart as well.


Original Backlink
Views: 1222

Get In Touch

Papillion, Nebraska, USA

info@evworld.com

SUPPORT EVWORLD

Become a patron and help spread the good news of the world of electric vehicles.

SxSE poster

© EVWORLD.COM. All Rights Reserved. Design by HTML Codex