{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:15:10Z","timestamp":1743128110291,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031199578"},{"type":"electronic","value":"9783031199585"}],"license":[{"start":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T00:00:00Z","timestamp":1666310400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T00:00:00Z","timestamp":1666310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-19958-5_19","type":"book-chapter","created":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T11:06:59Z","timestamp":1666264019000},"page":"200-209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Inter-application Communications Using Covert Channels in Android Applications"],"prefix":"10.1007","author":[{"given":"Nguyen Tan","family":"Cam","sequence":"first","affiliation":[]},{"given":"Pham Nhat","family":"Duy","sequence":"additional","affiliation":[]},{"given":"Vo Ngoc","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Nguyen Vuong","family":"Thinh","sequence":"additional","affiliation":[]},{"given":"Nguyen Chi","family":"Duc","sequence":"additional","affiliation":[]},{"given":"Nguyen Quoc","family":"Bao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,21]]},"reference":[{"key":"19_CR1","unstructured":"StatCounter: Mobile Operating System Market Share Worldwide (2021). [cited 2021 September 10]; Available from: https:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Casolare, R., et al.: Colluding Covert Channel for Malicious Information Exfiltration in Android Environment. In: ICISSP (2021)","DOI":"10.5220\/0010396708110818"},{"key":"19_CR3","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-981-16-9089-1_24","volume-title":"Security, Privacy and Data Analytics","author":"K Pandya","year":"2022","unstructured":"Pandya, K., Borisaniya, B., Buddhadev, B.: ShoutIMEI: Ultrasound Covert Channel-Based Attack in Android. In: Rao, U.P., Patel, S.J., Raj, P., Visconti, A. (eds.) Security, Privacy and Data Analytics. LNEE, vol. 848, pp. 293\u2013301. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-9089-1_24"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Pattani, K., Gautam, S.: A stealthy evasive information invasion using covert channel in mobile phones. In: 2021 International Conference on Artificial Intelligence and Machine Vision (AIMV) 2021","DOI":"10.1109\/AIMV53313.2021.9670998"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Ulz, T., et al.: Sensing Danger: Exploiting Sensors to Build Covert Channels. In: ICISSP (2019)","DOI":"10.5220\/0007353801000113"},{"key":"19_CR6","unstructured":"Schlegel, R., et al.: Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In: NDSS (2011)"},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1109\/OJCS.2021.3131598","volume":"2","author":"C Sun","year":"2021","unstructured":"Sun, C., et al.: Covert timing channels detection based on auxiliary classifier generative adversarial network. IEEE Open J. Comp. Soc. 2, 407\u2013418 (2021)","journal-title":"IEEE Open J. Comp. Soc."},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"38391","DOI":"10.1109\/ACCESS.2022.3164392","volume":"10","author":"MA Elsadig","year":"2022","unstructured":"Elsadig, M.A., Gafar, A.: Covert channel detection: machine learning approaches. IEEE Access 10, 38391\u201338405 (2022)","journal-title":"IEEE Access"},{"key":"19_CR9","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/978-3-030-99619-2_51","volume-title":"Advanced Information Networking and Applications","author":"S Al-Eidi","year":"2022","unstructured":"Al-Eidi, S., Darwish, O., Chen, Y., Elkhodr, M.: Covert Timing Channels Detection Based on Image Processing Using Deep Learning. In: Barolli, L., Hussain, F., Enokido, T. (eds.) AINA 2022. LNNS, vol. 451, pp. 546\u2013555. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99619-2_51"},{"key":"19_CR10","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-97643-3_1","volume-title":"Versatile Cybersecurity","author":"K Denney","year":"2018","unstructured":"Denney, K., Uluagac, A.S., Aksu, H., Akkaya, K.: An Android-Based Covert Channel Framework on Wearables Using Status Bar Notifications. In: Conti, M., Somani, G., Poovendran, R. (eds.) Versatile Cybersecurity. AIS, vol. 72, pp. 1\u201317. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-97643-3_1"},{"key":"19_CR11","unstructured":"Nottingham, B.B.: An Algorithm and Implementation to Detect Covert Channels and Data Leakage in Mobile Applications (2019)"},{"issue":"4","key":"19_CR12","doi-asserted-by":"publisher","first-page":"1449","DOI":"10.1007\/s11036-019-01482-6","volume":"26","author":"JE Coyac-Torres","year":"2021","unstructured":"Coyac-Torres, J.E., Rivero-Angeles, M.E., Aguirre-Anaya, E.: Cognitive radio based system for best effort communications in sound-based covert channel for iot environments. Mobile Networks and Applications 26(4), 1449\u20131460 (2021)","journal-title":"Mobile Networks and Applications"},{"key":"19_CR13","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1109\/ACCESS.2020.3046234","volume":"9","author":"S Al-Eidi","year":"2020","unstructured":"Al-Eidi, S., et al.: SnapCatch: automatic detection of covert timing channels using image processing and machine learning. IEEE Access 9, 177\u2013191 (2020)","journal-title":"IEEE Access"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Wang, J., Luo, L.: Privacy Leakage Analysis for Colluding Smart Apps. In: 2022 52nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W) 2022","DOI":"10.1109\/DSN-W54100.2022.00025"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing &amp; Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19958-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T11:52:25Z","timestamp":1666266745000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19958-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,21]]},"ISBN":["9783031199578","9783031199585"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19958-5_19","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022,10,21]]},"assertion":[{"value":"21 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing & Optimization","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hua Hin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ico2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icico.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}