A completely covert audio channel in Android
نویسندگان
چکیده
منابع مشابه
A New Sensors-Based Covert Channel on Android
Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. Aside from all sorts of malware, one threat proved intr...
متن کاملDemonstration of A Novel Storage Covert Channel on Android Smartwatch Using Status Bar Notifications
Covert channels have been used as a means to circumvent security measures and leak sensitive data undetectable to an onlooker. While these channels have been used in a lot of networks, their applications on mobile devices have just started to be seen. Recently, many covert channels in Android systems have been presented utilizing various available system resources. This demo aims to show how a ...
متن کاملRobust Covert Communication over a Public Audio Channel Using Spread Spectrum
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum for prevention against desynchronization attacks and (ii) psycho-acoustic frequency masking (PAFM). We show that PAFM impacts the balance of “ones” and “zeros” in the part of the spreadspectrum sequence used for waterma...
متن کاملA New Covert Channel over Cellular Voice Channel in Smartphones
smartphones has become increasingly important as smartphones have recently replaced the role of traditional computers. Smartphones are subject to traditional computer network covert channel techniques. Smartphones also introduce new sets of covert channel techniques as they add more capabilities and multiple network connections. This work presents a new network covert channel in smartphones. Th...
متن کاملCovert Channel Elimination Protocols
With the increasing growth of electronic communications, it is becoming important to provide a mechanism for enforcing various security policies on network communications. This paper discusses our implementation of several previously proposed protocols that enforce the Bell LaPadula security model. We also introduce a new protocol called \Quantized Pump" that ooers several advantages, and prese...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Virology and Hacking Techniques
سال: 2016
ISSN: 2263-8733
DOI: 10.1007/s11416-016-0272-4