{"id":"https://openalex.org/W2022609477","doi":"https://doi.org/10.1109/lcn.2012.6423634","title":"Detecting covert communication on Android","display_name":"Detecting covert communication on Android","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W2022609477","doi":"https://doi.org/10.1109/lcn.2012.6423634","mag":"2022609477"},"language":"en","primary_location":{"id":"doi:10.1109/lcn.2012.6423634","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2012.6423634","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"37th Annual IEEE Conference on Local Computer Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030616612","display_name":"Michael R. Hansen","orcid":"https://orcid.org/0000-0002-4775-4622"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michael Hansen","raw_affiliation_strings":["Indiana University, Bloomington, IN, USA","150 S. Woodlawn Ave., Bloomington, Indiana University, USA"],"affiliations":[{"raw_affiliation_string":"Indiana University, Bloomington, IN, USA","institution_ids":["https://openalex.org/I4210119109"]},{"raw_affiliation_string":"150 S. Woodlawn Ave., Bloomington, Indiana University, USA","institution_ids":["https://openalex.org/I4210119109"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045850342","display_name":"Raquel Hill","orcid":"https://orcid.org/0000-0001-7963-5540"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Raquel Hill","raw_affiliation_strings":["Indiana University, Bloomington, IN, USA","150 S. Woodlawn Ave., Bloomington, Indiana University, USA"],"affiliations":[{"raw_affiliation_string":"Indiana University, Bloomington, IN, USA","institution_ids":["https://openalex.org/I4210119109"]},{"raw_affiliation_string":"150 S. Woodlawn Ave., Bloomington, Indiana University, USA","institution_ids":["https://openalex.org/I4210119109"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032589710","display_name":"Seth Wimberly","orcid":null},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Seth Wimberly","raw_affiliation_strings":["Indiana University, Bloomington, IN, USA","150 S. Woodlawn Ave., Bloomington, Indiana University, USA"],"affiliations":[{"raw_affiliation_string":"Indiana University, Bloomington, IN, USA","institution_ids":["https://openalex.org/I4210119109"]},{"raw_affiliation_string":"150 S. Woodlawn Ave., Bloomington, Indiana University, USA","institution_ids":["https://openalex.org/I4210119109"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5030616612"],"corresponding_institution_ids":["https://openalex.org/I4210119109"],"apc_list":null,"apc_paid":null,"fwci":1.7139,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.87213937,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"7","issue":null,"first_page":"300","last_page":"303"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8072310090065002},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7192758321762085},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.693239152431488},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.6868249773979187},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5932279825210571},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.5593668818473816},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.5324640870094299},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48695477843284607},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.4741365611553192},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4268789291381836},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36310529708862305},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.35144758224487305},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2951408624649048},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.1447819173336029},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11401617527008057}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8072310090065002},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7192758321762085},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.693239152431488},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.6868249773979187},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5932279825210571},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.5593668818473816},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.5324640870094299},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48695477843284607},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.4741365611553192},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4268789291381836},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36310529708862305},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35144758224487305},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2951408624649048},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1447819173336029},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11401617527008057},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcn.2012.6423634","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2012.6423634","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"37th Annual IEEE Conference on Local Computer Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1917620371","https://openalex.org/W1963971515","https://openalex.org/W2101834106","https://openalex.org/W2121221235","https://openalex.org/W2145693081","https://openalex.org/W2166180744","https://openalex.org/W2399034518","https://openalex.org/W2400528202","https://openalex.org/W2784849271","https://openalex.org/W6641190993","https://openalex.org/W6712520696","https://openalex.org/W6713182605","https://openalex.org/W6748014466"],"related_works":["https://openalex.org/W2316685381","https://openalex.org/W2409612194","https://openalex.org/W2056388267","https://openalex.org/W2249350383","https://openalex.org/W2755037920","https://openalex.org/W4210309948","https://openalex.org/W2114381667","https://openalex.org/W4224042389","https://openalex.org/W4388923452","https://openalex.org/W2072937473"],"abstract_inverted_index":{"Using":[0],"covert":[1,53],"channels,":[2],"malicious":[3,76],"applications":[4,77],"on":[5,72,94,112],"Android-based":[6],"smartphones":[7],"are":[8,25],"able":[9],"to":[10,27,34,80],"subvert":[11],"the":[12,63,67,86,89,95,107],"permission":[13,61],"system":[14],"and":[15,30,48,91,100,115],"share":[16],"data":[17,113],"in":[18,38],"a":[19],"potentially":[20],"untraceable":[21],"manner.":[22],"These":[23],"channels":[24,93],"easy":[26],"exploit":[28],"today,":[29],"have":[31],"enough":[32],"bandwidth":[33],"transmit":[35],"sensitive":[36],"information":[37],"real-time":[39],"between":[40],"collaborating":[41],"applications.":[42],"In":[43],"this":[44],"paper,":[45],"we":[46,84],"define":[47],"implement":[49],"an":[50],"application":[51],"layer":[52],"communications":[54],"detector":[55,70],"that":[56,78],"does":[57],"not":[58],"require":[59],"special":[60],"from":[62],"user.":[64],"We":[65],"quantify":[66],"effect":[68],"our":[69],"has":[71],"channel":[73],"capacities":[74],"for":[75],"wish":[79],"remain":[81],"stealthy.":[82],"Lastly,":[83],"evaluate":[85],"robustness":[87],"of":[88,109],"volume":[90],"vibration":[92],"Android":[96],"emulator,":[97],"HTC":[98],"G1,":[99],"Motorola":[101],"Droid,":[102],"as":[103,105],"well":[104],"characterize":[106],"effects":[108],"background":[110],"noise":[111],"loss":[114],"transfer":[116],"rates.":[117]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
