2024
DOI: 10.1504/ijesdf.2024.10054215
|View full text |Cite
|
Sign up to set email alerts
|

A comparative study of Covert Channel attacks in Android with different parameters and detection tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…A new investigation conducted by Shah [27] introduced a method for establishing covert communication channels and transmitting confidential data among users via an audio file. This method is crafted to evade detection by current security measures, mainly because of the intricate code scrutiny necessary for detection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A new investigation conducted by Shah [27] introduced a method for establishing covert communication channels and transmitting confidential data among users via an audio file. This method is crafted to evade detection by current security measures, mainly because of the intricate code scrutiny necessary for detection.…”
Section: Literature Reviewmentioning
confidence: 99%