Abstract
Inter-application communication helps applications exchange information. Detecting applications that perform collaborative attacks to leak sensitive data out of the device needs to be done. Inter-application communication via covert channel can be used to bypass common inter-application communication analysis methods. In this study, we build a dataset containing the scenarios that cause information leakage across applications using covert channel such as using clipboard, screen brightness, stream volume level, call log. In addition, we propose a system that allows detection of covert channels in the datasets. The results of this study can be applied to many other related studies in the future.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
StatCounter: Mobile Operating System Market Share Worldwide (2021). [cited 2021 September 10]; Available from: https://gs.statcounter.com/os-market-share/mobile/worldwide
Casolare, R., et al.: Colluding Covert Channel for Malicious Information Exfiltration in Android Environment. In: ICISSP (2021)
Pandya, K., Borisaniya, B., Buddhadev, B.: ShoutIMEI: Ultrasound Covert Channel-Based Attack in Android. In: Rao, U.P., Patel, S.J., Raj, P., Visconti, A. (eds.) Security, Privacy and Data Analytics. LNEE, vol. 848, pp. 293–301. Springer, Singapore (2022). https://doi.org/10.1007/978-981-16-9089-1_24
Pattani, K., Gautam, S.: A stealthy evasive information invasion using covert channel in mobile phones. In: 2021 International Conference on Artificial Intelligence and Machine Vision (AIMV) 2021
Ulz, T., et al.: Sensing Danger: Exploiting Sensors to Build Covert Channels. In: ICISSP (2019)
Schlegel, R., et al.: Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In: NDSS (2011)
Sun, C., et al.: Covert timing channels detection based on auxiliary classifier generative adversarial network. IEEE Open J. Comp. Soc. 2, 407–418 (2021)
Elsadig, M.A., Gafar, A.: Covert channel detection: machine learning approaches. IEEE Access 10, 38391–38405 (2022)
Al-Eidi, S., Darwish, O., Chen, Y., Elkhodr, M.: Covert Timing Channels Detection Based on Image Processing Using Deep Learning. In: Barolli, L., Hussain, F., Enokido, T. (eds.) AINA 2022. LNNS, vol. 451, pp. 546–555. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-99619-2_51
Denney, K., Uluagac, A.S., Aksu, H., Akkaya, K.: An Android-Based Covert Channel Framework on Wearables Using Status Bar Notifications. In: Conti, M., Somani, G., Poovendran, R. (eds.) Versatile Cybersecurity. AIS, vol. 72, pp. 1–17. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-97643-3_1
Nottingham, B.B.: An Algorithm and Implementation to Detect Covert Channels and Data Leakage in Mobile Applications (2019)
Coyac-Torres, J.E., Rivero-Angeles, M.E., Aguirre-Anaya, E.: Cognitive radio based system for best effort communications in sound-based covert channel for iot environments. Mobile Networks and Applications 26(4), 1449–1460 (2021)
Al-Eidi, S., et al.: SnapCatch: automatic detection of covert timing channels using image processing and machine learning. IEEE Access 9, 177–191 (2020)
Wang, J., Luo, L.: Privacy Leakage Analysis for Colluding Smart Apps. In: 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W) 2022
Acknowledgement
This research is funded by the University of Information Technology, Vietnam National University HoChiMinh City (VNU-HCM) under Grant No. D1–2022-22.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Cam, N.T., Duy, P.N., Tan, V.N., Thinh, N.V., Duc, N.C., Bao, N.Q. (2023). Inter-application Communications Using Covert Channels in Android Applications. In: Vasant, P., Weber, GW., Marmolejo-Saucedo, J.A., Munapo, E., Thomas, J.J. (eds) Intelligent Computing & Optimization. ICO 2022. Lecture Notes in Networks and Systems, vol 569. Springer, Cham. https://doi.org/10.1007/978-3-031-19958-5_19
Download citation
DOI: https://doi.org/10.1007/978-3-031-19958-5_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-19957-8
Online ISBN: 978-3-031-19958-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)