DocumentCode :
591797
Title :
Detecting covert communication on Android
Author :
Hansen, Mark ; Hill, Richard ; Wimberly, S.
fYear :
2012
fDate :
22-25 Oct. 2012
Firstpage :
300
Lastpage :
303
Abstract :
Using covert channels, malicious applications on Android-based smartphones are able to subvert the permission system and share data in a potentially untraceable manner. These channels are easy to exploit today, and have enough bandwidth to transmit sensitive information in real-time between collaborating applications. In this paper, we define and implement an application layer covert communications detector that does not require special permission from the user. We quantify the effect our detector has on channel capacities for malicious applications that wish to remain stealthy. Lastly, we evaluate the robustness of the volume and vibration channels on the Android emulator, HTC G1, and Motorola Droid, as well as characterize the effects of background noise on data loss and transfer rates.
Keywords :
cryptography; smart phones; telecommunication security; Android based smartphones; Android emulator; HTC G1; Motorola Droid; application layer; background noise; covert communication detectors; data loss; permission system; transfer rates; vibration channels; Androids; Detectors; Humanoid robots; Monitoring; Security; Smart phones; Vibrations; Android smartphone; covert communication; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Local Computer Networks (LCN), 2012 IEEE 37th Conference on
Conference_Location :
Clearwater, FL
ISSN :
0742-1303
Print_ISBN :
978-1-4673-1565-4
Type :
conf
DOI :
10.1109/LCN.2012.6423634
Filename :
6423634
Link To Document :
بازگشت