当前位置: X-MOL 学术Int. J. Inf. Technol. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
SonicEvasion: a stealthy ultrasound based invasion using covert communication in smart phones and its security
International Journal of Information Technology Pub Date : 2021-06-04 , DOI: 10.1007/s41870-021-00614-0
Ketaki Pattani , Sunil Gautam

Mobile devices are no less than ticking time bombs if examined from security perspective, as their exertion is intense and relative security measures are quite a few. Attackers at present scenario are switching over to techniques that easily obfuscate the existing state-of-art tools and victims to get their work done. Evasion is one such tactic to confuse security system or obfuscate the information flow so as to go unnoticed from them. Whereas, covert channels are channels that hide the existence of communication itself, thereby making it unidentifiable for users as well as state-of-art tools. The paper presents a novel attack namely IEII(Implicit Evasive Information Invasion) presenting an algorithm developed to attack privacy and security of mobile devices. As a solution to the insecurity posed by the attack, a novel detection mechanism is also proposed. Concisely, the paper shows a novel approach showing an attack IEII with a level of obfuscation to bypass existing state-of-art mechanisms such as SuSi, FlowDroid etc. Also, its detection mechanism using AspectJ is developed. Hence, the paper opens up a new area depicting unforeseen threats and implementing its security in mobile devices with reference to the novel attack and detection proposed.



中文翻译:

SonicEvasion:一种在智能手机中使用隐蔽通信的基于超声波的隐形入侵及其安全性

如果从安全角度来看,移动设备不亚于滴答作响的定时炸弹,因为它们的作用很大,而且相关的安全措施相当多。目前的情况下,攻击者正在转向可以轻松混淆现有最先进工具和受害者的技术,以完成他们的工作。逃避就是这样一种策略,可以混淆安全系统或混淆信息流以使其不被注意。而隐蔽渠道是隐藏通信本身存在的渠道,从而使其无法被用户和最先进的工具识别。本文提出了一种新颖的攻击,即 IEII(隐式规避信息入侵),提出了一种用于攻击移动设备隐私和安全的算法。作为对攻击造成的不安全的解决方案,还提出了一种新的检测机制。简而言之,本文展示了一种新颖的方法,展示了一种具有一定混淆程度的攻击 IEII,可以绕过 SuSi、FlowDroid 等现有的最先进机制。此外,还开发了使用 AspectJ 的检测机制。因此,本文参考所提出的新颖攻击和检测,开辟了一个新领域,描述了不可预见的威胁并在移动设备中实现了其安全性。

更新日期:2021-06-04
down
wechat
bug