Abstract | ||
---|---|---|
By exploiting known covert channels, Android applications today are able to bypass the built-in permission system and share data in a potentially untraceable manner. These channels have sufficient bandwidth to transmit sensitive information, such as GPS locations, in real-time to collaborating applications with Internet access. In this paper, we extend previous work involving an application layer covert communications detector. We measure the stability of the volume and vibration channels on the Android emulator, HTC G1, and Motorola Droid. In addition, we quantify the effect that our detector has on channel capacities for stealthy malicious applications using a theoretical model. Lastly, we introduce a new classification of covert and overt communication for the Android platform. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1007/s11036-013-0482-7 | MONET |
Keywords | Field | DocType |
Covert communication,Android smartphones,Security | Permission,Application layer,Android (operating system),Computer science,Covert channel,Computer network,Communication channel,Covert,Bandwidth (signal processing),Internet access,Embedded system | Journal |
Volume | Issue | ISSN |
19 | 1 | 1383-469X |
Citations | PageRank | References |
0 | 0.34 | 18 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Raquel Hill | 1 | 57 | 7.81 |
Michael Hansen | 2 | 0 | 0.34 |
Veer Singh | 3 | 0 | 0.34 |