Demonstration of A Novel Storage Covert Channel on Android Smartwatch Using Status Bar Notifications

نویسندگان

  • Kyle Denney
  • A. Selcuk Uluagac
  • Kemal Akkaya
  • Nico Saputro
چکیده

Covert channels have been used as a means to circumvent security measures and leak sensitive data undetectable to an onlooker. While these channels have been used in a lot of networks, their applications on mobile devices have just started to be seen. Recently, many covert channels in Android systems have been presented utilizing various available system resources. This demo aims to show how a new storage covert channel can be implemented on wearable devices to leak data from them to outsiders by utilizing the notifications that are normally displayed on the status bar of an Android device. In this demo, we will present the detailed design and implementation of the covert channel for Android based wearable devices. Our demonstration will present the functionality and feasibility of the proposed covert channel on real devices. Keywords—Android, covert channel, security, mobile, wearables covert channels, Internet-of-Things covert channel

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a Systematic Study of the Covert Channel Attacks in Smartphones

Recently, there is a great attention on the security and privacy issues in smartphones due to their increasing number of users and wider range of apps. Mobile operating systems such as Android, provide mechanisms for data protection by restricting the communication between apps within the device. However, malicious apps can still overcome such restrictions through various ways such as exploitin...

متن کامل

Poster: Measuring and Optimizing Android Smartwatch Energy Consumption

Smartwatches are operating under tight energy constraints. In this paper, we describe our on-going work on measuring and optimizing Android smartwatch energy consumption. We derived power models for commodity smartwatches, and then applied the power model to an IRB-approved user study involving 30 smartwatch users. We then propose research ideas on improving energy efficiencies for Android smar...

متن کامل

A New Covert Channel over Cellular Voice Channel in Smartphones

smartphones has become increasingly important as smartphones have recently replaced the role of traditional computers. Smartphones are subject to traditional computer network covert channel techniques. Smartphones also introduce new sets of covert channel techniques as they add more capabilities and multiple network connections. This work presents a new network covert channel in smartphones. Th...

متن کامل

DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise

Air-gapped computers are disconnected from the Internet physically and logically. This measure is taken in order to prevent the leakage of sensitive data from secured networks. In the past, it has been shown that malware can exfiltrate data from air-gapped computers by transmitting ultrasonic signals via the computer’s speakers. However, such acoustic communication relies on the availability of...

متن کامل

An Effective Approach to Detect Malware that Exploit Information Hiding in Android Devices

A Malware is a very big threat in today’s computing world. It continues to grow in volume and evolve in complexity. Modern malware uses advanced techniques to hide from static and dynamic analysis tools. The existing system uses classification based and regression based approach for detection. The proposed system utilizes the classification based approach and regression based approach for detec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015