Covertvasion: Depicting threats through covert channels based novel evasive attacks in android
Privacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection by imposing restrictions on app behavior. Nevertheless, attackers conduct systematic resource ana...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
KeAi Communications Co., Ltd.
2023-01-01
|
Series: | International Journal of Intelligent Networks |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2666603023000349 |
_version_ | 1797388708141334528 |
---|---|
author | Sunil Gautam Ketaki Pattani Mohd Zuhair Mamoon Rashid Nazir Ahmad |
author_facet | Sunil Gautam Ketaki Pattani Mohd Zuhair Mamoon Rashid Nazir Ahmad |
author_sort | Sunil Gautam |
collection | DOAJ |
description | Privacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection by imposing restrictions on app behavior. Nevertheless, attackers conduct systematic resource analyses and divert privacy-sensitive information from plain view. They employ evasive mechanisms to evade system monitoring and create an illusion of benign and non-sensitive communication. Furthermore, covert channels amplify the impact of these malicious activities by facilitating information transfer through non-standard methods. The purpose of this research is to shed light on these novel threats targeting Android systems. The study delves into security and privacy attacks that compromise sensitive user information. The methodology leverages evasion concepts and employs sound-specific covert channel communication, particularly ultrasonic channels. This research work introduces novel evasive attacks, namely Prime-Composite Evasive Information Invasion (PCEII) and File-lock-based Evasive Information Invasion (FEII), both relying on covert channel communication. These unique variants of attacks successfully evade user data within a few milliseconds for both noisy as well as non-noisy environments and do not show any signs of detection by antivirus mechanisms like Anti-Virus Guard (AVG), 360 security, etc. and state-of-the-art tools such as TaintDroid, MockDroid and others. The paper not only assesses their impact on the privacy and security of information but also introduces avenues for their detection and mitigation. |
first_indexed | 2024-03-08T22:44:43Z |
format | Article |
id | doaj.art-d66d3326c8ea481b921fa61fa3f7f0a2 |
institution | Directory Open Access Journal |
issn | 2666-6030 |
language | English |
last_indexed | 2024-03-08T22:44:43Z |
publishDate | 2023-01-01 |
publisher | KeAi Communications Co., Ltd. |
record_format | Article |
series | International Journal of Intelligent Networks |
spelling | doaj.art-d66d3326c8ea481b921fa61fa3f7f0a22023-12-17T06:42:05ZengKeAi Communications Co., Ltd.International Journal of Intelligent Networks2666-60302023-01-014337348Covertvasion: Depicting threats through covert channels based novel evasive attacks in androidSunil Gautam0Ketaki Pattani1Mohd Zuhair2Mamoon Rashid3Nazir Ahmad4Department of Computer Science and Engineering, Institute of Technology, Nirma University Ahmedabad, Gujarat, IndiaDepartment of Computer Sciences and Engineering, Institute of Advanced Research, Gandhinagar, Gujarat, IndiaDepartment of Computer Science and Engineering, Institute of Technology, Nirma University Ahmedabad, Gujarat, IndiaSchool of Information Communication and Technology, Bahrain Polytechnic, Isa Town, Bahrain; Corresponding author.Department of Information System, College of Applied Sciences, King Khalid University, P.O. Box 61913, Muhayel, 63317, Saudi ArabiaPrivacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection by imposing restrictions on app behavior. Nevertheless, attackers conduct systematic resource analyses and divert privacy-sensitive information from plain view. They employ evasive mechanisms to evade system monitoring and create an illusion of benign and non-sensitive communication. Furthermore, covert channels amplify the impact of these malicious activities by facilitating information transfer through non-standard methods. The purpose of this research is to shed light on these novel threats targeting Android systems. The study delves into security and privacy attacks that compromise sensitive user information. The methodology leverages evasion concepts and employs sound-specific covert channel communication, particularly ultrasonic channels. This research work introduces novel evasive attacks, namely Prime-Composite Evasive Information Invasion (PCEII) and File-lock-based Evasive Information Invasion (FEII), both relying on covert channel communication. These unique variants of attacks successfully evade user data within a few milliseconds for both noisy as well as non-noisy environments and do not show any signs of detection by antivirus mechanisms like Anti-Virus Guard (AVG), 360 security, etc. and state-of-the-art tools such as TaintDroid, MockDroid and others. The paper not only assesses their impact on the privacy and security of information but also introduces avenues for their detection and mitigation.http://www.sciencedirect.com/science/article/pii/S2666603023000349Covert channelEvasionPrime-composite evasive information invasionFile-lock based evasive information invasion |
spellingShingle | Sunil Gautam Ketaki Pattani Mohd Zuhair Mamoon Rashid Nazir Ahmad Covertvasion: Depicting threats through covert channels based novel evasive attacks in android International Journal of Intelligent Networks Covert channel Evasion Prime-composite evasive information invasion File-lock based evasive information invasion |
title | Covertvasion: Depicting threats through covert channels based novel evasive attacks in android |
title_full | Covertvasion: Depicting threats through covert channels based novel evasive attacks in android |
title_fullStr | Covertvasion: Depicting threats through covert channels based novel evasive attacks in android |
title_full_unstemmed | Covertvasion: Depicting threats through covert channels based novel evasive attacks in android |
title_short | Covertvasion: Depicting threats through covert channels based novel evasive attacks in android |
title_sort | covertvasion depicting threats through covert channels based novel evasive attacks in android |
topic | Covert channel Evasion Prime-composite evasive information invasion File-lock based evasive information invasion |
url | http://www.sciencedirect.com/science/article/pii/S2666603023000349 |
work_keys_str_mv | AT sunilgautam covertvasiondepictingthreatsthroughcovertchannelsbasednovelevasiveattacksinandroid AT ketakipattani covertvasiondepictingthreatsthroughcovertchannelsbasednovelevasiveattacksinandroid AT mohdzuhair covertvasiondepictingthreatsthroughcovertchannelsbasednovelevasiveattacksinandroid AT mamoonrashid covertvasiondepictingthreatsthroughcovertchannelsbasednovelevasiveattacksinandroid AT nazirahmad covertvasiondepictingthreatsthroughcovertchannelsbasednovelevasiveattacksinandroid |