Quantifying and Classifying Covert Communications on Android

  • Authors:
  • Raquel Hill;Michael Hansen;Veer Singh

  • Affiliations:
  • Indiana University, Bloomington, US;Indiana University, Bloomington, US;Indiana University, Bloomington, US

  • Venue:
  • Mobile Networks and Applications
  • Year:
  • 2014

Quantified Score

Hi-index 0.00

Visualization

Abstract

By exploiting known covert channels, Android applications today are able to bypass the built-in permission system and share data in a potentially untraceable manner. These channels have sufficient bandwidth to transmit sensitive information, such as GPS locations, in real-time to collaborating applications with Internet access. In this paper, we extend previous work involving an application layer covert communications detector. We measure the stability of the volume and vibration channels on the Android emulator, HTC G1, and Motorola Droid. In addition, we quantify the effect that our detector has on channel capacities for stealthy malicious applications using a theoretical model. Lastly, we introduce a new classification of covert and overt communication for the Android platform.