International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

Research Article

Towards a Systematic Study of the Covert Channel Attacks in Smartphones

Download
287 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-23829-6_29,
        author={Swarup Chandra and Zhiqiang Lin and Ashish Kundu and Latifur Khan},
        title={Towards a Systematic Study of the Covert Channel Attacks in Smartphones},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I},
        proceedings_a={SECURECOMM},
        year={2015},
        month={11},
        keywords={Android Covert Channel Mobile Security},
        doi={10.1007/978-3-319-23829-6_29}
    }
    
  • Swarup Chandra
    Zhiqiang Lin
    Ashish Kundu
    Latifur Khan
    Year: 2015
    Towards a Systematic Study of the Covert Channel Attacks in Smartphones
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23829-6_29
Swarup Chandra1,*, Zhiqiang Lin1,*, Ashish Kundu2,*, Latifur Khan1,*
  • 1: The University of Texas at Dallas
  • 2: IBM T J Watson Research Center
*Contact email: swarup.chandra@utdallas.edu, zhiqiang.lin@utdallas.edu, akundu@us.ibm.com, lkhan@utdallas.edu

Abstract

Recently, there is a great attention on the smartphones security and privacy due to their increasing number of users and wide range of apps. Mobile operating systems such as Android, provide mechanisms for data protection by restricting the communication between apps within the device. However, malicious apps can still overcome such restrictions via various means such as exploiting the software vulnerability in systems or using covert channels for data transferring. In this paper, we aim to systematically analyze various resources available on Android for the possible use of covert channels between two malicious apps. From our systematized analysis, we identify two new hardware resources, namely battery and phone call, that can also be used as covert channels. We also find new features to enrich the existing approaches for better covert channel such as using the audio volume and screen brightness. Our experimental results show that high throughput data transmission can be achieved using these resources for the covert channel attacks.