Analyzing Covert Channels on Mobile Devices
نویسندگان
چکیده
In this work we investigate the problem of stealthy communication between colluding applications on smartphones running the popular Android operating system. Through collusion, applications can cooperatively perform operations they would not be able to perform separately, thus escalating their privileges. This can result in privacy infringements and user data leakage. In order to collude, the two applications must communicate in a way that can bypass the application isolation put in place by the operating system. Throughout this thesis we present different ways to bypass the isolation and thereby allow application collusion. As covert channels are by definition harder to implement but also harder to detect, we use them to create a circumvention that is harder to defeat. To understand the full extent of this problem, we implement very different overt and covert channels and analyse them by testing their throughput, bit-error percentage and synchronisation time. Using our implemented channels we analyse some previously existing countermeasures, in particular TaintDroid and XManDroid, and comment on the countermeasures strengths and limitations. Finally we use the lessons learned from implementing these channels and propose individual countermeasures, which can reduce the feasibility of creating such channels. In this scenario preventing hidden communication channels remains an open problem that we believe the research community should put more focus on.
منابع مشابه
Demonstration of A Novel Storage Covert Channel on Android Smartwatch Using Status Bar Notifications
Covert channels have been used as a means to circumvent security measures and leak sensitive data undetectable to an onlooker. While these channels have been used in a lot of networks, their applications on mobile devices have just started to be seen. Recently, many covert channels in Android systems have been presented utilizing various available system resources. This demo aims to show how a ...
متن کاملInaudible Sound as a Covert Channel in Mobile Devices
Mobile devices can be protected by a variety of information flow control systems. These systems can prevent Trojans from leaking secrets over network connections. As mobile devices become more secure, attackers will begin to use unconventional methods for exfiltrating data. We propose two sound-based covert channels, ultrasonic and isolated sound. Speakers on mobile devices can produce frequenc...
متن کاملEstablishing Multi-level Security in Mobile Data Access
Transaction processing over mobile networks faces new challenges due to limitations in bandwidth and available power, as well as due to intermittent connectivity that causes loss of data and transaction aborts. Besides, the possibility of security breach increases substantially due to the frequent motion of clients across cells, which gives rise to novel forms of covert channels. In this paper,...
متن کاملCountermeasures and Tradeoos for a Class of Covert Timing Channels Index Terms
We identify a class of covert timing channels with the following properties. (1) existing covert timing channel analysis techniques are inappropriate for the channels in this class; and (2) it includes the fastest (i.e., highest capacity) covert channels known to date. Since channels in this class are exploited by counting the occurrences of certain events, we call them counting channels. We de...
متن کاملInformation-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels
Appeared in P. Degano et al. (Ed.): Preproceedings of FAST 2008; c © Springer-Verlag (to be transferred) Abstract. We present a formal model for analyzing the bandwidth of covert channels. The focus is on channels that exploit interrupt-driven communication, which have been shown to pose a serious threat in practical experiments. Our work builds on our earlier model [1], which we used to compar...
متن کامل