Hiding privacy leaks in android applications using low-attention raising covert channels

JF Lalande, S Wendzel - 2013 international conference on …, 2013 - ieeexplore.ieee.org
… contribute to the stealthiness of the channels. Finally, we discuss … covert channels and we
also discuss the adaption of network covert channel features to Android-based covert channels

A New Sensors‐Based Covert Channel on Android

A Al-Haiqi, M Ismail, R Nordin - The Scientific World Journal, 2014 - Wiley Online Library
… such covert channel on Android platform of relatively low permission requirements and
hence more stealthiness compared with other exposed channels so far. This channel depends …

Exploring covert channel in android platform

W Gasior, L Yang - 2012 international conference on cyber …, 2012 - ieeexplore.ieee.org
covert channels on the Google Android mobile platform. Our work shows that covert
communication channels can be successfully implemented on the Android platform to allow data to …

Network covert channels on the android platform

W Gasior, L Yang - Proceedings of the Seventh Annual Workshop on …, 2011 - dl.acm.org
… To implement a storage-based covert channel, we designed an application that displays a
small advertisement banner at the bottom of an arbitrary application. The ads are fetched from …

An autonomic and permissionless android covert channel

K Block, S Narain, G Noubir - Proceedings of the 10th ACM Conference …, 2017 - dl.acm.org
… Less frequent perturbations emanated from the Android device directly ie, ringing and
event alerts. We believe that the environment was well suited for examining covert channel

[PDF][PDF] Detecting local covert channels using process activity correlation on android smartphones

M Urbanski, W Mazurczyk, JF Lalande… - International Journal of …, 2017 - researchgate.net
… Therefore, in this paper we focus on the detection of local covert channels in which colluding
applications are primarily active at the same time as they offer increased bandwidths and …

Towards a systematic study of the covert channel attacks in smartphones

S Chandra, Z Lin, A Kundu, L Khan - … , Revised Selected Papers, Part I 10, 2015 - Springer
… the software vulnerability in systems or using covert channels for data transferring. In this …
available on Android for the possible use of covert channels between two malicious apps. From …

[PDF][PDF] Analyzing covert channels on mobile devices

H Ritzdorf - 2012 - research-collection.ethz.ch
channels between two Android applications. We present overt and covert channels that we
… Additionally, we present a channel only requiring the installation of a single application and …

Inter-application communications using covert channels in android applications

NT Cam, PN Duy, VN Tan, NV Thinh, NC Duc… - … on Intelligent Computing …, 2022 - Springer
… In this study, we use more types of covert channels such as clipboard, … covert channels
to pass data across two applications. Using this covert channel helps to bypass inter-application

An overview of android covert channel

S Li, L Zhang, C Zhao - 2018 2nd IEEE Advanced Information …, 2018 - ieeexplore.ieee.org
… on typical Android covert channel and highlight some Android covert channel detection
methods. … model and category of covert channel. Section 3 analysis the principal of some typical …