Abstract

The proliferation of mobile devices and widening technological advancements have led the world to potential repercussions of insecurities. This brings in the most intrinsic requirement of security in mobile devices that may have crucial information like contacts, messages or payment passwords. However, the rapid advancements and technological vulnerabilities have created a space for these threats to get in unnoticed from detection mechanisms like reverse engineering. Covert channels that either disrupt the information flow or thwart the flow in order to sidestep the detection mechanisms and leak sensitive information have been discovered in mobile devices also. The paper depicts an attack PCEII utilizing one of such covert channels and evasive mechanism to bypass the detection mechanisms like reverse engineering, data and control flow tracking a malware detection tools. The current research discusses the malicious approaches of such covert channels based evasive attacks, their operation, research gap and its solution in detail. Also, it open up an area for defense against covert channels to be incorporated in state-of-art tools.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.