Cargando…

A New Sensors-Based Covert Channel on Android

Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: proc...

Descripción completa

Detalles Bibliográficos
Autores principales: Al-Haiqi, Ahmed, Ismail, Mahamod, Nordin, Rosdiadee
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4177823/
https://www.ncbi.nlm.nih.gov/pubmed/25295311
http://dx.doi.org/10.1155/2014/969628
_version_ 1782336844955910144
author Al-Haiqi, Ahmed
Ismail, Mahamod
Nordin, Rosdiadee
author_facet Al-Haiqi, Ahmed
Ismail, Mahamod
Nordin, Rosdiadee
author_sort Al-Haiqi, Ahmed
collection PubMed
description Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. Aside from all sorts of malware, one threat proved intractable by current protection solutions, that is, collusion attacks involving two applications communicating over covert channels. Still no universal solution can countermeasure this sort of attack unless the covert channels are known. This paper is an attempt to reveal a new covert channel, not only being specific to smartphones, but also exploiting an unusual resource as a vehicle to carry covert information: sensors data. Accelerometers generate signals that reflect user motions, and malware applications can apparently only read their data. However, if the vibration motor on the device is used properly, programmatically produced vibration patterns can encode stolen data and hence an application can cause discernible effects on acceleration data to be received and decoded by another application. Our evaluations confirmed a real threat where strings of tens of characters could be transmitted errorless if the throughput is reduced to around 2.5–5 bps. The proposed covert channel is very stealthy as no unusual permissions are required and there is no explicit communication between the colluding applications.
format Online
Article
Text
id pubmed-4177823
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-41778232014-10-07 A New Sensors-Based Covert Channel on Android Al-Haiqi, Ahmed Ismail, Mahamod Nordin, Rosdiadee ScientificWorldJournal Research Article Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. Aside from all sorts of malware, one threat proved intractable by current protection solutions, that is, collusion attacks involving two applications communicating over covert channels. Still no universal solution can countermeasure this sort of attack unless the covert channels are known. This paper is an attempt to reveal a new covert channel, not only being specific to smartphones, but also exploiting an unusual resource as a vehicle to carry covert information: sensors data. Accelerometers generate signals that reflect user motions, and malware applications can apparently only read their data. However, if the vibration motor on the device is used properly, programmatically produced vibration patterns can encode stolen data and hence an application can cause discernible effects on acceleration data to be received and decoded by another application. Our evaluations confirmed a real threat where strings of tens of characters could be transmitted errorless if the throughput is reduced to around 2.5–5 bps. The proposed covert channel is very stealthy as no unusual permissions are required and there is no explicit communication between the colluding applications. Hindawi Publishing Corporation 2014 2014-09-14 /pmc/articles/PMC4177823/ /pubmed/25295311 http://dx.doi.org/10.1155/2014/969628 Text en Copyright © 2014 Ahmed Al-Haiqi et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Al-Haiqi, Ahmed
Ismail, Mahamod
Nordin, Rosdiadee
A New Sensors-Based Covert Channel on Android
title A New Sensors-Based Covert Channel on Android
title_full A New Sensors-Based Covert Channel on Android
title_fullStr A New Sensors-Based Covert Channel on Android
title_full_unstemmed A New Sensors-Based Covert Channel on Android
title_short A New Sensors-Based Covert Channel on Android
title_sort new sensors-based covert channel on android
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4177823/
https://www.ncbi.nlm.nih.gov/pubmed/25295311
http://dx.doi.org/10.1155/2014/969628
work_keys_str_mv AT alhaiqiahmed anewsensorsbasedcovertchannelonandroid
AT ismailmahamod anewsensorsbasedcovertchannelonandroid
AT nordinrosdiadee anewsensorsbasedcovertchannelonandroid
AT alhaiqiahmed newsensorsbasedcovertchannelonandroid
AT ismailmahamod newsensorsbasedcovertchannelonandroid
AT nordinrosdiadee newsensorsbasedcovertchannelonandroid