Research Article
Towards a Systematic Study of the Covert Channel Attacks in Smartphones
@INPROCEEDINGS{10.1007/978-3-319-23829-6_29, author={Swarup Chandra and Zhiqiang Lin and Ashish Kundu and Latifur Khan}, title={Towards a Systematic Study of the Covert Channel Attacks in Smartphones}, proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I}, proceedings_a={SECURECOMM}, year={2015}, month={11}, keywords={Android Covert Channel Mobile Security}, doi={10.1007/978-3-319-23829-6_29} }
- Swarup Chandra
Zhiqiang Lin
Ashish Kundu
Latifur Khan
Year: 2015
Towards a Systematic Study of the Covert Channel Attacks in Smartphones
SECURECOMM
Springer
DOI: 10.1007/978-3-319-23829-6_29
Abstract
Recently, there is a great attention on the smartphones security and privacy due to their increasing number of users and wide range of apps. Mobile operating systems such as Android, provide mechanisms for data protection by restricting the communication between apps within the device. However, malicious apps can still overcome such restrictions via various means such as exploiting the software vulnerability in systems or using covert channels for data transferring. In this paper, we aim to systematically analyze various resources available on Android for the possible use of covert channels between two malicious apps. From our systematized analysis, we identify two new hardware resources, namely battery and phone call, that can also be used as covert channels. We also find new features to enrich the existing approaches for better covert channel such as using the audio volume and screen brightness. Our experimental results show that high throughput data transmission can be achieved using these resources for the covert channel attacks.