University of Bahrain
Scientific Journals

A Unique Approach for Ex-filtering Sensitive Data through an Audio Covert Channel in Android Application

Show simple item record

dc.contributor.author Shah, Abhinav K.
dc.contributor.author Rathod, Digvijaysinh M.
dc.contributor.author Buddhadev, Bharat
dc.contributor.author Rami, Jeet
dc.date.accessioned 2023-07-18T07:24:39Z
dc.date.available 2023-07-18T07:24:39Z
dc.date.issued 2023-07-18
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/5052
dc.description.abstract The rapid global evolution of technology has led to a significant shift in the field of cybersecurity. The advent of technologies such as Artificial Intelligence, Machine Learning, Blockchain, and Data Science has significantly increased the complexity and demand for research in the field of cybersecurity. Numerous authors and academics consistently engage in endeavors within this field to enhance existing implementations. Due to this process of evolution, several entities have experienced growth, leading to the transformation of numerous small-scale organizations into large-scale counterparts. The advent of the internet has resulted in significant growth for companies, albeit with divergent outcomes. Researchers are utilizing the internet to advance technological developments, while concurrently, certain individuals persistently seek means to undermine this technology. In conjunction with the proliferation of the internet, mobile phones have acquired a heightened level of sophistication, particularly with the advent of the Android operating system, leading to a shift in the manner in which individuals utilize these devices. As the Android operating system continues to advance, individuals are increasingly embracing and incorporating its features into their daily lives. Nevertheless, there are those that persistently endeavor to discover methods for illicitly extracting information from Android smartphones via a covert communication channel. This work introduces a novel methodology for transmitting confidential data, such as contact information and text messages, utilizing a concealed audio channel. The researchers conducted trials utilizing the most recent Android smartphones and arrived at the conclusion that it is feasible to transmit critical information to Android using this methodology. The experiment was conducted by the authors using various detection techniques, and it was determined that none of these tools are capable of detecting a hidden channel of this nature. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.subject Covert Channel en_US
dc.subject Android Application en_US
dc.subject Cyber Security en_US
dc.title A Unique Approach for Ex-filtering Sensitive Data through an Audio Covert Channel in Android Application en_US
dc.identifier.doi http://dx.doi.org/10.12785/ijcds/160112
dc.volume 16 en_US
dc.issue 1 en_US
dc.pagestart 147 en_US
dc.pageend 157 en_US
dc.contributor.authorcountry India en_US
dc.contributor.authoraffiliation School of Cyber Security & Digital Forensics, National Forensic Sciences University en_US
dc.contributor.authoraffiliation School of Cyber Security & Digital Forensics, National Forensic Sciences University
dc.contributor.authoraffiliation HoD Computer and IT, Government Of Gujarat
dc.contributor.authoraffiliation Threat Analyst, Microsoft
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

This item appears in the following Issue(s)

Show simple item record

All Journals


Advanced Search

Browse

Administrator Account