Volume 29, Issue 19 e4205
SPECIAL ISSUE PAPER

DroidAuditor: A framework for auditing covert communication on Android

Weizhong Qiang

Corresponding Author

Weizhong Qiang

Services Computing Technology and System Lab, Cluster and Grid Computing Lab, Big Data Technology and System Lab, Huazhong University of Science and Technology, Wuhan 430074, China

Correspondence

Weizhong Qiang, Huazhong University of Science and Technology, Wuhan 430074, China.

Email: [email protected]

Search for more papers by this author
Shifan Xin

Shifan Xin

Services Computing Technology and System Lab, Cluster and Grid Computing Lab, Big Data Technology and System Lab, Huazhong University of Science and Technology, Wuhan 430074, China

Search for more papers by this author
Hai Jin

Hai Jin

Services Computing Technology and System Lab, Cluster and Grid Computing Lab, Big Data Technology and System Lab, Huazhong University of Science and Technology, Wuhan 430074, China

Search for more papers by this author
Guozhong Sun

Guozhong Sun

Dawning Information Industry (Beijing) Co., Ltd., Beijing 100193, China

Search for more papers by this author
First published: 28 July 2017
Citations: 2

Summary

Exploitation of covert channels in smartphone operating systems may lead to furtive data transmission between applications with different permissions, which might threaten users' privacy. Restricting the access to shared system resources can effectively prevent the exploitation of known covert channels. However, it inevitably limits the normal usage of those resources. In this paper, we propose a general method that detects covert channel attack at runtime without impacting the accessibility of shared resources in the system. The main idea of the method is to track and audit the use of system resources known as potential covert channel variables and impose interferences on those channels to reduce their capacity once violations are detected. We implement a prototype framework, which is able to audit and interfere covert communication both in the application layer and in the native layer of Android. The experimental results demonstrate that our method can effectively reduce the data rate of user-defined covert channels while the overhead is negligible.

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.