A stealthy evasive information invasion using covert channel in mobile phones | IEEE Conference Publication | IEEE Xplore