Tags:Android Security, covert channels, mobile security and security
Abstract:
The Android operating system (OS) currently occupies the majority of the global smartphone market. Even IoT specific applications have prevailing OS as Android into their end device or intermediary communication channels. These Android devices may retain confidential information such as SMS, contacts, banking information, Personal Identification Number (PIN), location-specific information, photographs, videos, IoT devices workflow and so on. Furthermore, Android devices are popular among users due to their extensive capabilities and multiple connectivity options, making them a perfect target for attackers. To get their task done, attackers are shifting to methods that neatly disguise existing state-of-the-art equipment and targets. One such strategy is evasion, which is used to deceive security systems or conceal information flow in order to evade detection. Covert channels, on the other hand, disguise the existence of communication itself, making it unidentifiable to both users and cutting-edge technology. These covert channels, by employing evasive methods, become extremely undetectable and bypass security architecture, ensuring the security of the user's data. The research evaluates and analyses existing state-of-the-art technologies, as well as identifies potential defense mechanisms for mitigating and detecting such threats.
Defense and Evaluation Against Covert Channel Based Attacks in Android Smartphones