DOI QR코드

DOI QR Code

Covert Channel Based on Instruction Gadgets in Smart Sensing Devices

  • Ho, Jun-Won (Department of Information Security, Seoul Women's University)
  • Received : 2017.09.10
  • Accepted : 2017.11.11
  • Published : 2017.12.31

Abstract

In this paper, we design a covert channel based on instruction gadgets in smart sensing devices. Unlike the existing convert channels that usually utilize diverse physical characteristics or user behaviors or sensory data of smart sensing devices, we show that instruction gadgets could be exploited for covert channel establishment in smart sensing devices. In our devised covert channels, trojan smart sensing devices exchange attack packets in such a way that they encode an attack bit in attack packet to a series of addresses of instruction gadgets and decode an attack bit from a series of addresses of instruction gadgets.

Keywords

References

  1. A. Al-Haiqi, M. Ismail, and R. Nordin. A New Sensors-Based Covert Channel on Android. The Scientific World Journal, 2014.
  2. A. El-Atawy and E. Al-Shaer, Building covert channels over the packet reordering phenomenon, In IEEE INFOCOM, 2009.
  3. L. Deshotels, Inaudible sound as a covert channel in mobile devices, In WOOT, 2014.
  4. J. G. N, R. Greenstadt, P. Litwack, and R. Tibbetts, "Covert messaging through tcp timestamps," In Workshop on Privacy Enhancing Technologies, 2002.
  5. J. Ho, K. Won, and J. Kim. POSTER: Covert Channel Based on the Sequential Analysis in Android Systems. In ACM CCS, 2017.
  6. J. Lalande and S. Wendzel. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In ARES, 2013.
  7. S. Li and A. Epliremides, A network layer covert channel in ad- hoc wireless networks, In IEEE SECON, 2004.
  8. E. Novak, Y. Tang, Z. Hao, Q. Li, and Y. Zhang. Physical media covert channels on smart mobile devices. In UbiComp, 2015.
  9. K. Okamura and Y. Oyama, Load-based covert channels between xen virtual machines, In SAC, 2010.
  10. W. Qi, Y. Xu, W. Ding, Y. Jiang, J. Wang, and K. Lu. Privacy Leaks When You Play Games: A Novel User Behavior Based Covert Channel on Smartphones. In ICNP, 2015.
  11. R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A Stealthy and ContextAware Sound Trojan for Smartphones. In NDSS, 2011.
  12. Z. Wang and R. B. Lee, Covert and side channels due to processor architecture, In ACSAC, 2006.
  13. Z. Wu, Z. Xu, and H. Wang, Whispers in the hyper-space: High-speed covert channel attacks in the cloud, In USENIX Security, 2012