Abstract:
The rapid global evolution of technology has led to a significant shift in the field of cybersecurity. The advent of technologies
such as Artificial Intelligence, Machine Learning, Blockchain, and Data Science has significantly increased the complexity and demand
for research in the field of cybersecurity. Numerous authors and academics consistently engage in endeavors within this field to enhance
existing implementations. Due to this process of evolution, several entities have experienced growth, leading to the transformation
of numerous small-scale organizations into large-scale counterparts. The advent of the internet has resulted in significant growth
for companies, albeit with divergent outcomes. Researchers are utilizing the internet to advance technological developments, while
concurrently, certain individuals persistently seek means to undermine this technology. In conjunction with the proliferation of the
internet, mobile phones have acquired a heightened level of sophistication, particularly with the advent of the Android operating system,
leading to a shift in the manner in which individuals utilize these devices. As the Android operating system continues to advance,
individuals are increasingly embracing and incorporating its features into their daily lives. Nevertheless, there are those that persistently
endeavor to discover methods for illicitly extracting information from Android smartphones via a covert communication channel. This
work introduces a novel methodology for transmitting confidential data, such as contact information and text messages, utilizing a
concealed audio channel. The researchers conducted trials utilizing the most recent Android smartphones and arrived at the conclusion
that it is feasible to transmit critical information to Android using this methodology. The experiment was conducted by the authors
using various detection techniques, and it was determined that none of these tools are capable of detecting a hidden channel of this nature.