Covertvasion: Depicting threats through covert channels based novel evasive attacks in android

Privacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection by imposing restrictions on app behavior. Nevertheless, attackers conduct systematic resource ana...

Full description

Bibliographic Details
Main Authors: Sunil Gautam, Ketaki Pattani, Mohd Zuhair, Mamoon Rashid, Nazir Ahmad
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2023-01-01
Series:International Journal of Intelligent Networks
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2666603023000349
_version_ 1797388708141334528
author Sunil Gautam
Ketaki Pattani
Mohd Zuhair
Mamoon Rashid
Nazir Ahmad
author_facet Sunil Gautam
Ketaki Pattani
Mohd Zuhair
Mamoon Rashid
Nazir Ahmad
author_sort Sunil Gautam
collection DOAJ
description Privacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection by imposing restrictions on app behavior. Nevertheless, attackers conduct systematic resource analyses and divert privacy-sensitive information from plain view. They employ evasive mechanisms to evade system monitoring and create an illusion of benign and non-sensitive communication. Furthermore, covert channels amplify the impact of these malicious activities by facilitating information transfer through non-standard methods. The purpose of this research is to shed light on these novel threats targeting Android systems. The study delves into security and privacy attacks that compromise sensitive user information. The methodology leverages evasion concepts and employs sound-specific covert channel communication, particularly ultrasonic channels. This research work introduces novel evasive attacks, namely Prime-Composite Evasive Information Invasion (PCEII) and File-lock-based Evasive Information Invasion (FEII), both relying on covert channel communication. These unique variants of attacks successfully evade user data within a few milliseconds for both noisy as well as non-noisy environments and do not show any signs of detection by antivirus mechanisms like Anti-Virus Guard (AVG), 360 security, etc. and state-of-the-art tools such as TaintDroid, MockDroid and others. The paper not only assesses their impact on the privacy and security of information but also introduces avenues for their detection and mitigation.
first_indexed 2024-03-08T22:44:43Z
format Article
id doaj.art-d66d3326c8ea481b921fa61fa3f7f0a2
institution Directory Open Access Journal
issn 2666-6030
language English
last_indexed 2024-03-08T22:44:43Z
publishDate 2023-01-01
publisher KeAi Communications Co., Ltd.
record_format Article
series International Journal of Intelligent Networks
spelling doaj.art-d66d3326c8ea481b921fa61fa3f7f0a22023-12-17T06:42:05ZengKeAi Communications Co., Ltd.International Journal of Intelligent Networks2666-60302023-01-014337348Covertvasion: Depicting threats through covert channels based novel evasive attacks in androidSunil Gautam0Ketaki Pattani1Mohd Zuhair2Mamoon Rashid3Nazir Ahmad4Department of Computer Science and Engineering, Institute of Technology, Nirma University Ahmedabad, Gujarat, IndiaDepartment of Computer Sciences and Engineering, Institute of Advanced Research, Gandhinagar, Gujarat, IndiaDepartment of Computer Science and Engineering, Institute of Technology, Nirma University Ahmedabad, Gujarat, IndiaSchool of Information Communication and Technology, Bahrain Polytechnic, Isa Town, Bahrain; Corresponding author.Department of Information System, College of Applied Sciences, King Khalid University, P.O. Box 61913, Muhayel, 63317, Saudi ArabiaPrivacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection by imposing restrictions on app behavior. Nevertheless, attackers conduct systematic resource analyses and divert privacy-sensitive information from plain view. They employ evasive mechanisms to evade system monitoring and create an illusion of benign and non-sensitive communication. Furthermore, covert channels amplify the impact of these malicious activities by facilitating information transfer through non-standard methods. The purpose of this research is to shed light on these novel threats targeting Android systems. The study delves into security and privacy attacks that compromise sensitive user information. The methodology leverages evasion concepts and employs sound-specific covert channel communication, particularly ultrasonic channels. This research work introduces novel evasive attacks, namely Prime-Composite Evasive Information Invasion (PCEII) and File-lock-based Evasive Information Invasion (FEII), both relying on covert channel communication. These unique variants of attacks successfully evade user data within a few milliseconds for both noisy as well as non-noisy environments and do not show any signs of detection by antivirus mechanisms like Anti-Virus Guard (AVG), 360 security, etc. and state-of-the-art tools such as TaintDroid, MockDroid and others. The paper not only assesses their impact on the privacy and security of information but also introduces avenues for their detection and mitigation.http://www.sciencedirect.com/science/article/pii/S2666603023000349Covert channelEvasionPrime-composite evasive information invasionFile-lock based evasive information invasion
spellingShingle Sunil Gautam
Ketaki Pattani
Mohd Zuhair
Mamoon Rashid
Nazir Ahmad
Covertvasion: Depicting threats through covert channels based novel evasive attacks in android
International Journal of Intelligent Networks
Covert channel
Evasion
Prime-composite evasive information invasion
File-lock based evasive information invasion
title Covertvasion: Depicting threats through covert channels based novel evasive attacks in android
title_full Covertvasion: Depicting threats through covert channels based novel evasive attacks in android
title_fullStr Covertvasion: Depicting threats through covert channels based novel evasive attacks in android
title_full_unstemmed Covertvasion: Depicting threats through covert channels based novel evasive attacks in android
title_short Covertvasion: Depicting threats through covert channels based novel evasive attacks in android
title_sort covertvasion depicting threats through covert channels based novel evasive attacks in android
topic Covert channel
Evasion
Prime-composite evasive information invasion
File-lock based evasive information invasion
url http://www.sciencedirect.com/science/article/pii/S2666603023000349
work_keys_str_mv AT sunilgautam covertvasiondepictingthreatsthroughcovertchannelsbasednovelevasiveattacksinandroid
AT ketakipattani covertvasiondepictingthreatsthroughcovertchannelsbasednovelevasiveattacksinandroid
AT mohdzuhair covertvasiondepictingthreatsthroughcovertchannelsbasednovelevasiveattacksinandroid
AT mamoonrashid covertvasiondepictingthreatsthroughcovertchannelsbasednovelevasiveattacksinandroid
AT nazirahmad covertvasiondepictingthreatsthroughcovertchannelsbasednovelevasiveattacksinandroid