Acknowledgement
This work was supported by a research grant from Seoul Women's University (2021-0092).
References
- D. Evtyushkin and D. Ponomarev, "Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations," In ACM CCS, 2016. DOI: https://doi.org/10.1145/2976749.2978374.
- M. Guri, Y. Solewicz, A. Daidakulov, and Y. Elovici, "Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise (diskfiltration)," In European Symposium on Research in Computer Security, 2017. DOI: https://doi.org/10.1007/978-3-319-66399-9_6.
- T. Heard, D. Johnson, and B. Stackpole, "Exploring a high-capacity covert channel on the Android operating system," In IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2015. DOI: https://doi.org/10.1109/IDAACS.2015.7340765.
- J. Ho, "Covert Channel Establishment Through the Dynamic Adaptation of the Sequential Probability Ratio Test to Sensor Data in IoT," in IEEE Access, vol. 7, pp. 146093-146107, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2945974.
- M. Maschler, E. Solan, and S. Zamir, Game Theory, Cambridge University Press, Second Edition 2020.
- W. Qi, Y. Xu, W. Ding, Y. Jiang, J. Wang, and K. Lu, "Privacy Leaks When You Play Games: A Novel User-Behavior-Based Covert Channel on Smartphones," In ICNP, 2015. DOI: https://doi.org/10.1109/ICNP.2015.40.
- J. Wang, W. Tang, X. Li and S. Li, "Optimal Strategy in Covert Communication based on Game Theory, " 2019 IEEE/CIC International Conference on Communications in China (ICCC), Changchun, China, 2019, pp. 189-194. DOI: https://doi.org/10.1109/ICCChina.2019.8855950
- S. Cabuk, C. Brodley, and C. Shields, "IP covert timing channels: Design and detection," In ACM Conference on Computer and Communications Security, October 2004. DOI: https://doi.org/10.1145/1030083.1030108.
- A. Al-Haiqi, M. Ismail, and R. Nordin, "A New Sensors-Based Covert Channel on Android," In The Sci entific World Journal, DOI: https://doi.org/10.1155/2014/969628, 2014.
- R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang, "Soundcomber: A Stealthy and Context Aware Sound Trojan for Smartphones," In NDSS, 2011.
- K. Block, S. Narain, and G. Noubir, "An Autonomic and Permissionless Android Covert Channel," In ACM WiSec, 2017. DOI: https://doi.org/10.1145/3098243.3098250.