Skip to main content

Inter-application Communications Using Covert Channels in Android Applications

  • Conference paper
  • First Online:
Intelligent Computing & Optimization (ICO 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 569))

Included in the following conference series:

Abstract

Inter-application communication helps applications exchange information. Detecting applications that perform collaborative attacks to leak sensitive data out of the device needs to be done. Inter-application communication via covert channel can be used to bypass common inter-application communication analysis methods. In this study, we build a dataset containing the scenarios that cause information leakage across applications using covert channel such as using clipboard, screen brightness, stream volume level, call log. In addition, we propose a system that allows detection of covert channels in the datasets. The results of this study can be applied to many other related studies in the future.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. StatCounter: Mobile Operating System Market Share Worldwide (2021). [cited 2021 September 10]; Available from: https://gs.statcounter.com/os-market-share/mobile/worldwide

  2. Casolare, R., et al.: Colluding Covert Channel for Malicious Information Exfiltration in Android Environment. In: ICISSP (2021)

    Google Scholar 

  3. Pandya, K., Borisaniya, B., Buddhadev, B.: ShoutIMEI: Ultrasound Covert Channel-Based Attack in Android. In: Rao, U.P., Patel, S.J., Raj, P., Visconti, A. (eds.) Security, Privacy and Data Analytics. LNEE, vol. 848, pp. 293–301. Springer, Singapore (2022). https://doi.org/10.1007/978-981-16-9089-1_24

    Chapter  Google Scholar 

  4. Pattani, K., Gautam, S.: A stealthy evasive information invasion using covert channel in mobile phones. In: 2021 International Conference on Artificial Intelligence and Machine Vision (AIMV) 2021

    Google Scholar 

  5. Ulz, T., et al.: Sensing Danger: Exploiting Sensors to Build Covert Channels. In: ICISSP (2019)

    Google Scholar 

  6. Schlegel, R., et al.: Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In: NDSS (2011)

    Google Scholar 

  7. Sun, C., et al.: Covert timing channels detection based on auxiliary classifier generative adversarial network. IEEE Open J. Comp. Soc. 2, 407–418 (2021)

    Article  Google Scholar 

  8. Elsadig, M.A., Gafar, A.: Covert channel detection: machine learning approaches. IEEE Access 10, 38391–38405 (2022)

    Article  Google Scholar 

  9. Al-Eidi, S., Darwish, O., Chen, Y., Elkhodr, M.: Covert Timing Channels Detection Based on Image Processing Using Deep Learning. In: Barolli, L., Hussain, F., Enokido, T. (eds.) AINA 2022. LNNS, vol. 451, pp. 546–555. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-99619-2_51

    Chapter  Google Scholar 

  10. Denney, K., Uluagac, A.S., Aksu, H., Akkaya, K.: An Android-Based Covert Channel Framework on Wearables Using Status Bar Notifications. In: Conti, M., Somani, G., Poovendran, R. (eds.) Versatile Cybersecurity. AIS, vol. 72, pp. 1–17. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-97643-3_1

    Chapter  Google Scholar 

  11. Nottingham, B.B.: An Algorithm and Implementation to Detect Covert Channels and Data Leakage in Mobile Applications (2019)

    Google Scholar 

  12. Coyac-Torres, J.E., Rivero-Angeles, M.E., Aguirre-Anaya, E.: Cognitive radio based system for best effort communications in sound-based covert channel for iot environments. Mobile Networks and Applications 26(4), 1449–1460 (2021)

    Article  Google Scholar 

  13. Al-Eidi, S., et al.: SnapCatch: automatic detection of covert timing channels using image processing and machine learning. IEEE Access 9, 177–191 (2020)

    Article  Google Scholar 

  14. Wang, J., Luo, L.: Privacy Leakage Analysis for Colluding Smart Apps. In: 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W) 2022

    Google Scholar 

Download references

Acknowledgement

This research is funded by the University of Information Technology, Vietnam National University HoChiMinh City (VNU-HCM) under Grant No. D1–2022-22.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nguyen Tan Cam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cam, N.T., Duy, P.N., Tan, V.N., Thinh, N.V., Duc, N.C., Bao, N.Q. (2023). Inter-application Communications Using Covert Channels in Android Applications. In: Vasant, P., Weber, GW., Marmolejo-Saucedo, J.A., Munapo, E., Thomas, J.J. (eds) Intelligent Computing & Optimization. ICO 2022. Lecture Notes in Networks and Systems, vol 569. Springer, Cham. https://doi.org/10.1007/978-3-031-19958-5_19

Download citation

Publish with us

Policies and ethics