在 Android 应用程序中通过音频隐蔽信道过滤敏感数据的独特方法

Abhinav K. Shah, D. M. M. Rathod, Bharat Buddhadev, Jeet Rami
{"title":"在 Android 应用程序中通过音频隐蔽信道过滤敏感数据的独特方法","authors":"Abhinav K. Shah, D. M. M. Rathod, Bharat Buddhadev, Jeet Rami","doi":"10.12785/ijcds/160112","DOIUrl":null,"url":null,"abstract":": The rapid global evolution of technology has led to a significant shift in the field of cybersecurity. The advent of technologies such as Artificial Intelligence, Machine Learning, Blockchain, and Data Science has significantly increased the complexity and demand for research in the field of cybersecurity. Numerous authors and academics consistently engage in endeavors within this field to enhance existing implementations. Due to this process of evolution, several entities have experienced growth, leading to the transformation of numerous small-scale organizations into large-scale counterparts. The advent of the internet has resulted in significant growth for companies, albeit with divergent outcomes. Researchers are utilizing the internet to advance technological developments, while concurrently, certain individuals persistently seek means to undermine this technology. In conjunction with the proliferation of the internet, mobile phones have acquired a heightened level of sophistication, particularly with the advent of the Android operating system, leading to a shift in the manner in which individuals utilize these devices. As the Android operating system continues to advance, individuals are increasingly embracing and incorporating its features into their daily lives. Nevertheless, there are those that persistently endeavor to discover methods for illicitly extracting information from Android smartphones via a covert communication channel. This work introduces a novel methodology for transmitting confidential data, such as contact information and text messages, utilizing a concealed audio channel. The researchers conducted trials utilizing the most recent Android smartphones and arrived at the conclusion that it is feasible to transmit critical information to Android using this methodology. The experiment was conducted by the authors using various detection techniques, and it was determined that none of these tools are capable of detecting a hidden channel of this nature.","PeriodicalId":37180,"journal":{"name":"International Journal of Computing and Digital Systems","volume":"99 3","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Unique Approach for Ex-filtering Sensitive Data Through an Audio Covert Channel in Android Application\",\"authors\":\"Abhinav K. Shah, D. M. M. Rathod, Bharat Buddhadev, Jeet Rami\",\"doi\":\"10.12785/ijcds/160112\",\"DOIUrl\":null,\"url\":null,\"abstract\":\": The rapid global evolution of technology has led to a significant shift in the field of cybersecurity. The advent of technologies such as Artificial Intelligence, Machine Learning, Blockchain, and Data Science has significantly increased the complexity and demand for research in the field of cybersecurity. Numerous authors and academics consistently engage in endeavors within this field to enhance existing implementations. Due to this process of evolution, several entities have experienced growth, leading to the transformation of numerous small-scale organizations into large-scale counterparts. The advent of the internet has resulted in significant growth for companies, albeit with divergent outcomes. Researchers are utilizing the internet to advance technological developments, while concurrently, certain individuals persistently seek means to undermine this technology. In conjunction with the proliferation of the internet, mobile phones have acquired a heightened level of sophistication, particularly with the advent of the Android operating system, leading to a shift in the manner in which individuals utilize these devices. As the Android operating system continues to advance, individuals are increasingly embracing and incorporating its features into their daily lives. Nevertheless, there are those that persistently endeavor to discover methods for illicitly extracting information from Android smartphones via a covert communication channel. This work introduces a novel methodology for transmitting confidential data, such as contact information and text messages, utilizing a concealed audio channel. The researchers conducted trials utilizing the most recent Android smartphones and arrived at the conclusion that it is feasible to transmit critical information to Android using this methodology. The experiment was conducted by the authors using various detection techniques, and it was determined that none of these tools are capable of detecting a hidden channel of this nature.\",\"PeriodicalId\":37180,\"journal\":{\"name\":\"International Journal of Computing and Digital Systems\",\"volume\":\"99 3\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computing and Digital Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12785/ijcds/160112\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computing and Digital Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12785/ijcds/160112","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

:全球技术的快速发展导致网络安全领域发生了重大转变。人工智能、机器学习、区块链和数据科学等技术的出现大大增加了网络安全领域研究的复杂性和需求。众多作者和学者不断在这一领域做出努力,以加强现有的实施。由于这一演变过程,一些实体经历了增长,导致许多小规模组织转变为大规模对应组织。互联网的出现为企业带来了显著的增长,尽管结果各不相同。研究人员正在利用互联网推动技术发展,与此同时,某些人却在不断寻求破坏这一技术的手段。随着互联网的普及,移动电话也变得越来越先进,特别是随着安卓操作系统的出现,个人使用这些设备的方式也发生了转变。随着安卓操作系统的不断进步,越来越多的人开始接受并将其功能融入日常生活。然而,仍有人在不断努力探索通过隐蔽通信渠道从安卓智能手机中非法提取信息的方法。本作品介绍了一种利用隐蔽音频信道传输联系人信息和短信等机密数据的新方法。研究人员利用最新的安卓智能手机进行了试验,得出的结论是,利用这种方法向安卓系统传输关键信息是可行的。作者使用各种检测技术进行了试验,结果发现这些工具都无法检测到这种性质的隐藏信道。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Unique Approach for Ex-filtering Sensitive Data Through an Audio Covert Channel in Android Application
: The rapid global evolution of technology has led to a significant shift in the field of cybersecurity. The advent of technologies such as Artificial Intelligence, Machine Learning, Blockchain, and Data Science has significantly increased the complexity and demand for research in the field of cybersecurity. Numerous authors and academics consistently engage in endeavors within this field to enhance existing implementations. Due to this process of evolution, several entities have experienced growth, leading to the transformation of numerous small-scale organizations into large-scale counterparts. The advent of the internet has resulted in significant growth for companies, albeit with divergent outcomes. Researchers are utilizing the internet to advance technological developments, while concurrently, certain individuals persistently seek means to undermine this technology. In conjunction with the proliferation of the internet, mobile phones have acquired a heightened level of sophistication, particularly with the advent of the Android operating system, leading to a shift in the manner in which individuals utilize these devices. As the Android operating system continues to advance, individuals are increasingly embracing and incorporating its features into their daily lives. Nevertheless, there are those that persistently endeavor to discover methods for illicitly extracting information from Android smartphones via a covert communication channel. This work introduces a novel methodology for transmitting confidential data, such as contact information and text messages, utilizing a concealed audio channel. The researchers conducted trials utilizing the most recent Android smartphones and arrived at the conclusion that it is feasible to transmit critical information to Android using this methodology. The experiment was conducted by the authors using various detection techniques, and it was determined that none of these tools are capable of detecting a hidden channel of this nature.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Computing and Digital Systems
International Journal of Computing and Digital Systems Business, Management and Accounting-Management of Technology and Innovation
CiteScore
1.70
自引率
0.00%
发文量
111
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信