About covert timing channels in OS Android
Prikladnaya Diskretnaya Matematika. Supplement, no. 7 (2014), pp. 92-94.

Voir la notice de l'article provenant de la source Math-Net.Ru

Two new covert timing channels are discovered in Android software. The first one is found in the last versions of Android OS. It is based on changing the size of free space in the file system. Two malwares can use this channel for hidden communication. Two applications are developed for testing the channel. It is shown that its capacity equals 20 b/s. The second covert channel is based on a time difference for execution of a system function with some fixed secret and various open (controlled by any user) data. An information flow through the channel is realized from a legal application to a malware without permission of the legal application.
Keywords: covert channels, malware.
Mots-clés : Android
@article{PDMA_2014_7_a39,
     author = {T. I. Milovanov},
     title = {About covert timing channels in {OS} {Android}},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {92--94},
     publisher = {mathdoc},
     number = {7},
     year = {2014},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2014_7_a39/}
}
TY  - JOUR
AU  - T. I. Milovanov
TI  - About covert timing channels in OS Android
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2014
SP  - 92
EP  - 94
IS  - 7
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2014_7_a39/
LA  - ru
ID  - PDMA_2014_7_a39
ER  - 
%0 Journal Article
%A T. I. Milovanov
%T About covert timing channels in OS Android
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2014
%P 92-94
%N 7
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2014_7_a39/
%G ru
%F PDMA_2014_7_a39
T. I. Milovanov. About covert timing channels in OS Android. Prikladnaya Diskretnaya Matematika. Supplement, no. 7 (2014), pp. 92-94. http://geodesic.mathdoc.fr/item/PDMA_2014_7_a39/

[1] Schlegel R., Zhang K., Zhou X., et al., “Soundcomber: a stealthy and context-aware sound Trojan for smartphones”, Proc. 18th Annual Network and Distributed System Security Symposium, NDSS' 11 (San Diego, CA, February 6–9, 2011), 17–33