References
- A. Al-Haiqi, M. Ismail, and R. Nordin. A New Sensors-Based Covert Channel on Android. The Scientific World Journal, 2014.
- A. El-Atawy and E. Al-Shaer, Building covert channels over the packet reordering phenomenon, In IEEE INFOCOM, 2009.
- L. Deshotels, Inaudible sound as a covert channel in mobile devices, In WOOT, 2014.
- J. G. N, R. Greenstadt, P. Litwack, and R. Tibbetts, "Covert messaging through tcp timestamps," In Workshop on Privacy Enhancing Technologies, 2002.
- J. Ho, K. Won, and J. Kim. POSTER: Covert Channel Based on the Sequential Analysis in Android Systems. In ACM CCS, 2017.
- J. Lalande and S. Wendzel. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In ARES, 2013.
- S. Li and A. Epliremides, A network layer covert channel in ad- hoc wireless networks, In IEEE SECON, 2004.
- E. Novak, Y. Tang, Z. Hao, Q. Li, and Y. Zhang. Physical media covert channels on smart mobile devices. In UbiComp, 2015.
- K. Okamura and Y. Oyama, Load-based covert channels between xen virtual machines, In SAC, 2010.
- W. Qi, Y. Xu, W. Ding, Y. Jiang, J. Wang, and K. Lu. Privacy Leaks When You Play Games: A Novel User Behavior Based Covert Channel on Smartphones. In ICNP, 2015.
- R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A Stealthy and ContextAware Sound Trojan for Smartphones. In NDSS, 2011.
- Z. Wang and R. B. Lee, Covert and side channels due to processor architecture, In ACSAC, 2006.
- Z. Wu, Z. Xu, and H. Wang, Whispers in the hyper-space: High-speed covert channel attacks in the cloud, In USENIX Security, 2012