Abstract

Privacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection by imposing restrictions on app behavior. Nevertheless, attackers conduct systematic resource analyses and divert privacy-sensitive information from plain view. They employ evasive mechanisms to evade system monitoring and create an illusion of benign and non-sensitive communication. Furthermore, covert channels amplify the impact of these malicious activities by facilitating information transfer through non-standard methods. The purpose of this research is to shed light on these novel threats targeting Android systems. The study delves into security and privacy attacks that compromise sensitive user information. The methodology leverages evasion concepts and employs sound-specific covert channel communication, particularly ultrasonic channels. This research work introduces novel evasive attacks, namely Prime-Composite Evasive Information Invasion (PCEII) and File-lock-based Evasive Information Invasion (FEII), both relying on covert channel communication. These unique variants of attacks successfully evade user data within a few milliseconds for both noisy as well as non-noisy environments and do not show any signs of detection by antivirus mechanisms like Anti-Virus Guard (AVG), 360 security, etc. and state-of-the-art tools such as TaintDroid, MockDroid and others. The paper not only assesses their impact on the privacy and security of information but also introduces avenues for their detection and mitigation.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call