Committee Chair

Yang, Li

Committee Member

Sartipi, Mina; Kizza, Joseph

Department

Dept. of Computer Science and Engineering

College

College of Engineering and Computer Science

Publisher

University of Tennessee at Chattanooga

Place of Publication

Chattanooga (Tenn.)

Abstract

Network covert channels are used to exfiltrate information from a secured environment in a way that is extremely difficult to detect or prevent. These secret channels have been identified as an important security threat to governments and the private sector, and several research efforts have focused on the design, detection, and prevention of such channels in enterprise-type environments. Mobile devices have become a ubiquitous computing platform, and are storing or have access to an increasingly large amount of sensitive information. As such, these devices have become prime targets of attackers who desire access to this information. In this work, we explore the implementation of network covert channels on the Google Android mobile platform. Our work shows that covert communication channels can be successfully implemented on the Android platform to allow data to be leaked from these devices in a manner that hides the fact that subversive communication is taking place.

Degree

M. S.; A thesis submitted to the faculty of the University of Tennessee at Chattanooga in partial fulfillment of the requirements of the degree of Master of Science.

Date

12-2011

Subject

Computer security

Discipline

Computer Sciences

Document Type

Masters theses

DCMI Type

Text

Extent

ix, 73 leaves

Language

English

Rights

https://rightsstatements.org/page/InC/1.0/?language=en

License

http://creativecommons.org/licenses/by-nc-nd/3.0/

Share

COinS