Covert channel attacks have been a significant concern in recent times. With the evolution of the internet and technology, users have adapted to it differently. Cyber security is one of the areas which has opened doors in terms of research and development. Smartphone users have grown considerably in the last decade. With this growth, on the other side, attackers have found an opportunity to create covert channels to leak sensitive information from android devices. Different attacks have been performed in the past, which can leak information such as contact numbers, sms, call logs, battery state, alarm state, and much more details similarly. Various security researchers have already worked in this domain and have built different static and dynamic detection tools to identify covert channels in android devices or applications. In this paper, the author has provided a systematic review of different detection tools used to identify such attacks. The author has executed various detection tools against an application that was able to leak sensitive information through a covert channel. The author also provides a comparative analysis of results by executing different tools in Android. At the end of this paper, the author concludes by giving limitations present in the existing tools.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.