DOI QR코드

DOI QR Code

Creating Covert Channel by Harnessing Shapley Values from Smartphone Sensor Data

  • Ho, Jun-Won (Department of Information Security, Seoul Women's University)
  • Received : 2021.06.14
  • Accepted : 2021.06.20
  • Published : 2021.09.30

Abstract

In this paper, we devise a Shapley-value-based covert channel in smartphones. More specifically, unlike ordinary use of Shapley value in cooperative game, we make use of a series of Shapley values, which are computed from sensor data collected from smartphones, in order to create a covert channel between encoding smartphone and decoding smartphone. To the best of our knowledge, we are the first to contrive covert channel based on Shapley values. We evaluate the encoding process of our proposed covert channel through simulation and present our evaluation results.

Keywords

Acknowledgement

This work was supported by a research grant from Seoul Women's University (2021-0092).

References

  1. D. Evtyushkin and D. Ponomarev, "Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations," In ACM CCS, 2016. DOI: https://doi.org/10.1145/2976749.2978374.
  2. M. Guri, Y. Solewicz, A. Daidakulov, and Y. Elovici, "Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise (diskfiltration)," In European Symposium on Research in Computer Security, 2017. DOI: https://doi.org/10.1007/978-3-319-66399-9_6.
  3. T. Heard, D. Johnson, and B. Stackpole, "Exploring a high-capacity covert channel on the Android operating system," In IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2015. DOI: https://doi.org/10.1109/IDAACS.2015.7340765.
  4. J. Ho, "Covert Channel Establishment Through the Dynamic Adaptation of the Sequential Probability Ratio Test to Sensor Data in IoT," in IEEE Access, vol. 7, pp. 146093-146107, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2945974.
  5. M. Maschler, E. Solan, and S. Zamir, Game Theory, Cambridge University Press, Second Edition 2020.
  6. W. Qi, Y. Xu, W. Ding, Y. Jiang, J. Wang, and K. Lu, "Privacy Leaks When You Play Games: A Novel User-Behavior-Based Covert Channel on Smartphones," In ICNP, 2015. DOI: https://doi.org/10.1109/ICNP.2015.40.
  7. J. Wang, W. Tang, X. Li and S. Li, "Optimal Strategy in Covert Communication based on Game Theory, " 2019 IEEE/CIC International Conference on Communications in China (ICCC), Changchun, China, 2019, pp. 189-194. DOI: https://doi.org/10.1109/ICCChina.2019.8855950
  8. S. Cabuk, C. Brodley, and C. Shields, "IP covert timing channels: Design and detection," In ACM Conference on Computer and Communications Security, October 2004. DOI: https://doi.org/10.1145/1030083.1030108.
  9. A. Al-Haiqi, M. Ismail, and R. Nordin, "A New Sensors-Based Covert Channel on Android," In The Sci entific World Journal, DOI: https://doi.org/10.1155/2014/969628, 2014.
  10. R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang, "Soundcomber: A Stealthy and Context Aware Sound Trojan for Smartphones," In NDSS, 2011.
  11. K. Block, S. Narain, and G. Noubir, "An Autonomic and Permissionless Android Covert Channel," In ACM WiSec, 2017. DOI: https://doi.org/10.1145/3098243.3098250.