Browse > Article
http://dx.doi.org/10.7236/IJASC.2017.6.4.8

Covert Channel Based on Instruction Gadgets in Smart Sensing Devices  

Ho, Jun-Won (Department of Information Security, Seoul Women's University)
Publication Information
International journal of advanced smart convergence / v.6, no.4, 2017 , pp. 56-59 More about this Journal
Abstract
In this paper, we design a covert channel based on instruction gadgets in smart sensing devices. Unlike the existing convert channels that usually utilize diverse physical characteristics or user behaviors or sensory data of smart sensing devices, we show that instruction gadgets could be exploited for covert channel establishment in smart sensing devices. In our devised covert channels, trojan smart sensing devices exchange attack packets in such a way that they encode an attack bit in attack packet to a series of addresses of instruction gadgets and decode an attack bit from a series of addresses of instruction gadgets.
Keywords
Covert Channel; Instruction Gadgets; Smart Sensing Devices;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Al-Haiqi, M. Ismail, and R. Nordin. A New Sensors-Based Covert Channel on Android. The Scientific World Journal, 2014.
2 A. El-Atawy and E. Al-Shaer, Building covert channels over the packet reordering phenomenon, In IEEE INFOCOM, 2009.
3 L. Deshotels, Inaudible sound as a covert channel in mobile devices, In WOOT, 2014.
4 J. G. N, R. Greenstadt, P. Litwack, and R. Tibbetts, "Covert messaging through tcp timestamps," In Workshop on Privacy Enhancing Technologies, 2002.
5 J. Ho, K. Won, and J. Kim. POSTER: Covert Channel Based on the Sequential Analysis in Android Systems. In ACM CCS, 2017.
6 J. Lalande and S. Wendzel. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In ARES, 2013.
7 S. Li and A. Epliremides, A network layer covert channel in ad- hoc wireless networks, In IEEE SECON, 2004.
8 E. Novak, Y. Tang, Z. Hao, Q. Li, and Y. Zhang. Physical media covert channels on smart mobile devices. In UbiComp, 2015.
9 K. Okamura and Y. Oyama, Load-based covert channels between xen virtual machines, In SAC, 2010.
10 W. Qi, Y. Xu, W. Ding, Y. Jiang, J. Wang, and K. Lu. Privacy Leaks When You Play Games: A Novel User Behavior Based Covert Channel on Smartphones. In ICNP, 2015.
11 R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A Stealthy and ContextAware Sound Trojan for Smartphones. In NDSS, 2011.
12 Z. Wang and R. B. Lee, Covert and side channels due to processor architecture, In ACSAC, 2006.
13 Z. Wu, Z. Xu, and H. Wang, Whispers in the hyper-space: High-speed covert channel attacks in the cloud, In USENIX Security, 2012