Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 969628, 14 pages
http://dx.doi.org/10.1155/2014/969628
Research Article

A New Sensors-Based Covert Channel on Android

Department of Electrical, Electronic and Systems Engineering, National University of Malaysia (UKM), 43600 Bangi, Malaysia

Received 8 May 2014; Accepted 1 August 2014; Published 14 September 2014

Academic Editor: Alessandro Bogliolo

Copyright © 2014 Ahmed Al-Haiqi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. W. Enck, P. Gilbert, B. G. Chun et al., “TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones,” in Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI '10), pp. 393–407, Vancouver, Canada, October 2010.
  2. C. Marforio, H. Ritzdorf, A. Francillon, and S. Capkun, “Analysis of the communication between colluding applications on modern Smartphones,” in Proceeding of the 28th Annual Computer Security Applications Conference (ACSAC '12), pp. 51–60, New York, NY, USA, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. B. W. Lampson, “A note on the confinement problem,” Communications of the ACM, vol. 16, no. 10, pp. 613–615, 1973. View at Publisher · View at Google Scholar · View at Scopus
  4. R. A. Kemmerer, “Shared resource matrix methodology: an approach to identifying storage and timing channels,” ACM Transactions on Computer Systems, vol. 1, no. 3, pp. 256–277, 1983. View at Publisher · View at Google Scholar
  5. J. A. Goguen and J. Meseguer, “Security policies and security models,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 11–20, Oakland, Calif, USA, April 1982.
  6. S. Zander, G. Armitage, and P. Branch, “A survey of covert channels and countermeasures in computer network protocols,” IEEE Communications Surveys and Tutorials, vol. 9, no. 3, pp. 44–57, 2007. View at Publisher · View at Google Scholar · View at Scopus
  7. G. J. Simmons, “The prisoners’ problem and the subliminal channel,” in Advances in Cryptology: Proceedings of Crypto 83, pp. 51–67, Springer, Plenum Press, New York, NY, USA, 1984. View at Publisher · View at Google Scholar
  8. Mobile Security, Lookout, 2014, https://www.lookout.com/.
  9. R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang, “Soundcomber: a stealthy and context-aware sound trojan for smartphones,” in Proceedings of the 18th Annual Network Distributed System Security Symposium (NDSS '11), pp. 17–33, San Diego, Calif, USA, February 2011.
  10. J. F. Lalande and S. Wendzel, “Hiding privacy leaks in android applications using low-attention raising covert channels,” in Proceedings of the 8th International Conference on Availability, Reliability and Security (ARES '13), pp. 701–710, September 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. W. Gasior and L. Yang, “Exploring covert channel in android platform,” in Proceedings of the ASE International Conference on Cyber Security (CyberSecurity '12), pp. 173–177, Washington, DC, USA, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A. R. Sadeghi, and B. Shastry, “Towards taming privilege-escalation attacks on android,” in Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS ʼ12), pp. 18–25, San Diego, Calif, USA, 2012.
  13. M. Hansen, R. Hill, and S. Wimberly, “Detecting covert communication on Android,” in Proceedings of the 37th Annual IEEE Conference on Local Computer Networks (LCN '12), pp. 300–303, Clearwater, Fla, USA, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. H. Kim, J. Smith, and K. G. Shin, “Detecting energy-greedy anomalies and mobile malware variants,” in Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services ( MobiSys '08), pp. 239–252, Breckenridge, Colo, USA, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  15. Sensors Overview, “Android Developers,” 2014, http://developer.android.com/guide/topics/sensors/sensors_overview.html.
  16. Android Wear, 2014, http://developer.android.com/wear/index.html.
  17. L. Cai, S. Machiraju, and H. Chen, “Defending against sensor-sniffing attacks on mobile phones,” in Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds (MobiHeld '09), pp. 31–36, Barcelona, Spain, August 2009.
  18. L. Cai and H. Chen, “Touchlogger: inferring keystrokes on touch screen from smartphone motion,” in Proceedings of the 6th USENIX Workshop on Hot Topics in Security (HotSec '11), p. 9, San Francisco, Calif, USA, August 2011.
  19. E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang, “ACCessory: password inference using accelerometers on smartphones,” in Proceeding of the 13th Workshop on Mobile Computing Systems and Applications (HotMobile '12), no. 9, New York, NY, USA, February 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. Z. Xu, K. Bai, and S. Zhu, “TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors,” in Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 113–124, Tucson, Ariz, USA, April 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R. R. Choudhury, “Tapprints: your finger taps have fingerprints,” in Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys '12), pp. 323–336, Ambleside, UK, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. A. J. Aviv, B. Sapp, M. Blaze, and J. M. Smith, “Practicality of accelerometer side channels on smartphones,” in Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC '12), pp. 41–50, Orlando, Fla, USA, December 2012.
  23. S. Dey, N. Roy, W. Xu, R. R. Choudhury, and S. Nelakuditi, “AccelPrint: imperfections of accelerometers make smartphones trackable,” in Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '14), pp. 1–16, San Diego, Calif, USA, February 2014.
  24. A. Al-Haiqi, M. Ismail, and R. Nordin, “The eye as a new side channel threat on smartphones,” in Proceedings of the IEEE Student Conference on Research and Development (SCOReD '13), pp. 475–479, Putrajaya, Malaysia, December 2013.
  25. Issue 3708, 2014, https://code.google.com/p/android/issues/detail?id=3708.
  26. Vibrator Class-Android Developers, 2014, http://developer.android.com/reference/android/os/Vibrator.html.