Milette, G. and Stroud, A. (2012). Professional Android
Sensor Programming. John Wiley & Sons.
Mirzamohammadi, S., Chen, J. A., Sani, A. A., Mehrotra,
S., and Tsudik, G. (2017). Ditio: Trustworthy Audit-
ing of Sensor Activities in Mobile & IoT Devices. In
Proceedings of the 15th ACM Conference on Embed-
ded Network Sensor Systems, page 14. ACM.
Molka, D., Hackenberg, D., Sch
¨
one, R., and Nagel, W. E.
(2015). Cache Coherence Protocol and Memory Per-
formance of the Intel Haswell-EP Architecture. In
Parallel Processing (ICPP), 2015 44th International
Conference on, pages 739–748. IEEE.
Nguyen, A., Alqurashi, R., Raghebi, Z., Banaei-Kashani,
F., Halbower, A. C., and Vu, T. (2016). A Lightweight
and Inexpensive In-ear Sensing System For Automatic
Whole-night Sleep Stage Monitoring. In Proceedings
of the 14th ACM Conference on Embedded Network
Sensor Systems CD-ROM, pages 230–244. ACM.
Osvik, D. A., Shamir, A., and Tromer, E. (2006). Cache
Attacks and Countermeasures: The Case of AES. In
Cryptographers’ Track at the RSA Conference, pages
1–20. Springer.
Perera, C., Zaslavsky, A., Christen, P., and Georgakopoulos,
D. (2014). Context Aware Computing for The Internet
of Things: A Survey. IEEE Communications Surveys
& Tutorials, 16(1):414–454.
Perrig, A., Stankovic, J., and Wagner, D. (2004). Security
in Wireless Sensor Networks. Communications of the
ACM, 47(6):53–57.
Pessl, P., Gruss, D., Maurice, C., Schwarz, M., and Man-
gard, S. (2016). DRAMA: Exploiting DRAM Ad-
dressing for Cross-CPU Attacks. In USENIX Security
Symposium, pages 565–581.
Poeplau, S., Fratantonio, Y., Bianchi, A., Kruegel, C., and
Vigna, G. (2014). Execute This! Analyzing Un-
safe and Malicious Dynamic Code Loading in An-
droid Applications. In Proceedings of the 21st Annual
Network and Distributed System Security Symposium,
NDSS, pages 23–26. The Internet Society.
Rezaei, F., Hempel, M., Peng, D., Qian, Y., and Sharif,
H. (2013). Analysis and Evaluation of Covert Chan-
nels over LTE Advanced. In WCNC Intl. Conf., 2013
IEEE, pages 1903–1908. IEEE.
Sadeghi, A.-R., Wachsmann, C., and Waidner, M. (2015).
Security and Privacy Challenges in Industrial Internet
of Things. In Proceedings of the 52Nd Annual Design
Automation Conference, pages 54:1–54:6. ACM.
Shannon, C. E. (1948). A Mathematical Theory of Commu-
nication. Bell System Technical Journal, 27(3):379–
423.
Shrivastava, A., Jain, P., Demetriou, S., Cox, P., and Kim,
K.-H. (2017). CamForensics: Understanding Visual
Privacy Leaks in the Wild. In Proceedings of the 15th
ACM Conference on Embedded Network Sensor Sys-
tems, page 13. ACM.
Spreitzer, R. (2014). PIN Skimming: Exploiting the
Ambient-Light Sensor in Mobile Devices. In Pro-
ceedings of the 4th ACM Workshop on Security and
Privacy in Smartphones & Mobile Devices, pages 51–
62. ACM.
Srbinovska, M., Gavrovski, C., Dimcev, V., Krkoleva, A.,
and Borozan, V. (2015). Environmental parameters
monitoring in precision agriculture using wireless sen-
sor networks. Journal of cleaner production, 88.
STMicroelectronics (2015). LSM9DS1 iNEMO inertial
module: 3D accelerometer, 3D gyroscope, 3D mag-
netometer. [Online; accessed 10-March-2018].
STMicroelectronics (2016). HTS221: Capacitive digital
sensor for relative humidity and temperature. [Online;
accessed 10-March-2018].
Suo, H., Wan, J., Zou, C., and Liu, J. (2012). Security
in the Internet of Things: A Review. In Computer
Science and Electronics Engineering (ICCSEE), 2012
Intl. Conf. on, volume 3, pages 648–651. IEEE.
Tuptuk, N. and Hailes, S. (2015). Covert Channel Attacks
in Pervasive Computing. In Pervasive Computing and
Communications (PerCom), 2015 IEEE International
Conference on, pages 236–242. IEEE.
Wang, Z. and Lee, R. B. (2006). Covert and Side Channels
Due to Processor Architecture. In Computer Security
Applications Conference, 2006. ACSAC’06. 22nd An-
nual, pages 473–482. IEEE.
Wu, J., Ding, L., Wang, Y., and Han, W. (2011). Iden-
tification and Evaluation of Sharing Memory Covert
Timing Channel in Xen Virtual Machines. In Cloud
Computing (CLOUD), 2011 IEEE International Con-
ference on, pages 283–291. IEEE.
Xiao, J., Xu, Z., Huang, H., and Wang, H. (2013). Security
Implications of Memory Deduplication in a Virtual-
ized Environment. In Dependable Systems and Net-
works (DSN), 2013 43rd Annual IEEE/IFIP Interna-
tional Conference on, pages 1–12. IEEE.
Yarom, Y. and Falkner, K. (2014). Flush+Reload: A High
Resolution, Low Noise, L3 Cache Side-Channel At-
tack. In USENIX Sec. Symp., pages 719–732.
Yi, X., Bouguettaya, A., Georgakopoulos, D., Song, A., and
Willemson, J. (2016). Privacy Protection for Wireless
Medical Sensor Data. IEEE Transactions on Depend-
able and Secure Computing, 13(3):369–380.
Yu, J., Zhao, J., Chen, Y., and Yang, J. (2015). Sensing
Ambient Light for User Experience-Oriented Color
Scheme Adaptation on Smartphone Displays. In Pro-
ceedings of the 13th ACM Conference on Embedded
Networked Sensor Systems, pages 309–321. ACM.
Zander, S., Armitage, G., and Branch, P. (2007a). A Sur-
vey of Covert Channels and Countermeasures in Com-
puter Network Protocols. IEEE Communications Sur-
veys & Tutorials, 9(3):44–57.
Zander, S., Armitage, G., and Branch, P. (2007b). An Em-
pirical Evaluation of IP Time To Live Covert Chan-
nels. In Networks, 2007. ICON 2007. 15th IEEE In-
ternational Conference on, pages 42–47. IEEE.
Zhang, Y., Juels, A., Reiter, M. K., and Ristenpart, T.
(2012). Cross-VM Side Channels and Their Use to
Extract Private Keys. In Proceedings of the 2012 ACM
Conference on Computer and Communications Secu-
rity, pages 305–316. ACM.
Sensing Danger: Exploiting Sensors to Build Covert Channels
113