A New Sensors-Based Covert Channel on Android
نویسندگان
چکیده
Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. Aside from all sorts of malware, one threat proved intractable by current protection solutions, that is, collusion attacks involving two applications communicating over covert channels. Still no universal solution can countermeasure this sort of attack unless the covert channels are known. This paper is an attempt to reveal a new covert channel, not only being specific to smartphones, but also exploiting an unusual resource as a vehicle to carry covert information: sensors data. Accelerometers generate signals that reflect user motions, and malware applications can apparently only read their data. However, if the vibration motor on the device is used properly, programmatically produced vibration patterns can encode stolen data and hence an application can cause discernible effects on acceleration data to be received and decoded by another application. Our evaluations confirmed a real threat where strings of tens of characters could be transmitted errorless if the throughput is reduced to around 2.5-5 bps. The proposed covert channel is very stealthy as no unusual permissions are required and there is no explicit communication between the colluding applications.
منابع مشابه
Demonstration of A Novel Storage Covert Channel on Android Smartwatch Using Status Bar Notifications
Covert channels have been used as a means to circumvent security measures and leak sensitive data undetectable to an onlooker. While these channels have been used in a lot of networks, their applications on mobile devices have just started to be seen. Recently, many covert channels in Android systems have been presented utilizing various available system resources. This demo aims to show how a ...
متن کاملA New Covert Channel over Cellular Voice Channel in Smartphones
smartphones has become increasingly important as smartphones have recently replaced the role of traditional computers. Smartphones are subject to traditional computer network covert channel techniques. Smartphones also introduce new sets of covert channel techniques as they add more capabilities and multiple network connections. This work presents a new network covert channel in smartphones. Th...
متن کاملTowards a Systematic Study of the Covert Channel Attacks in Smartphones
Recently, there is a great attention on the security and privacy issues in smartphones due to their increasing number of users and wider range of apps. Mobile operating systems such as Android, provide mechanisms for data protection by restricting the communication between apps within the device. However, malicious apps can still overcome such restrictions through various ways such as exploitin...
متن کاملAn Effective Approach to Detect Malware that Exploit Information Hiding in Android Devices
A Malware is a very big threat in today’s computing world. It continues to grow in volume and evolve in complexity. Modern malware uses advanced techniques to hide from static and dynamic analysis tools. The existing system uses classification based and regression based approach for detection. The proposed system utilizes the classification based approach and regression based approach for detec...
متن کاملInaudible Sound as a Covert Channel in Mobile Devices
Mobile devices can be protected by a variety of information flow control systems. These systems can prevent Trojans from leaking secrets over network connections. As mobile devices become more secure, attackers will begin to use unconventional methods for exfiltrating data. We propose two sound-based covert channels, ultrasonic and isolated sound. Speakers on mobile devices can produce frequenc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014