A TOOL FOR VOLATILE MEMORY ACQUISITION FROM ANDROID DEVICES

被引:6
|
作者
Yang, Haiyu [1 ]
Zhuge, Jianwei [2 ]
Liu, Huiming [3 ]
Liu, Wei [3 ]
机构
[1] Tsinghua Univ, Thermal Engn, Beijing, Peoples R China
[2] Tsinghua Univ, Inst Network Sci & Cyberspace, Comp Sci, Beijing, Peoples R China
[3] Tsinghua Univ, Comp Sci, Beijing, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Mobile device forensics; memory forensics; Android; rootkit detection; FORENSICS;
D O I
10.1007/978-3-319-46279-0_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Memory forensic tools provide a thorough way to detect malware and investigate cyber crimes. However, existing memory forensic tools must be compiled against the exact version of the kernel source code and the exact kernel configuration. This poses a problem for Android devices because there are more than 1,000 manufacturers and each manufacturer maintains its own kernel. Moreover, new security enhancements introduced in Android Lollipop prevent most memory acquisition tools from executing. This chapter describes AMExtractor, a tool for acquiring volatile physical memory from a wide range of Android devices with high integrity. AMExtractor uses /dev/kmem to execute code in kernel mode, which is supported by most Android devices. Device-specific information is extracted at runtime without any assumptions about the target kernel source code and configuration. AMExtractor has been successfully tested on several devices shipped with different versions of the Android operating system, including the latest Android Lollipop. Memory images dumped by AMExtractor can be exported to other forensic frameworks for deep analysis. A rootkit was successfully detected using the Volatility Framework on memory images retrieved by AMExtractor.
引用
收藏
页码:365 / 378
页数:14
相关论文
共 50 条
  • [1] Acquisition and analysis of volatile memory from android devices
    Sylve, Joe
    Case, Andrew
    Marziale, Lodovico
    Richard, Golden G.
    DIGITAL INVESTIGATION, 2012, 8 (3-4) : 175 - 184
  • [2] META: Memory Exploration Tool for Android Devices
    Parikh, Nisarg
    Gohil, Varun
    Awasthi, Manu
    MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, : 774 - 776
  • [3] Logical acquisition and analysis of data from android mobile devices
    Srivastava, Himanshu
    Tapaswi, Shashikala
    INFORMATION AND COMPUTER SECURITY, 2015, 23 (05) : 450 - 475
  • [4] Dump and Analysis of Android Volatile Memory on Wechat
    Zhou, Fan
    Yang, Yitao
    Ding, Zhaokun
    Sun, Guozi
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 7151 - 7156
  • [5] Forensic analysis of Email on Android volatile Memory
    Chen, Long
    Mao, Yue
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 945 - 951
  • [6] Live acquisition of main memory data from Android smartphones and smartwatches
    Yang, Seung Jei
    Choi, Jung Ho
    Kim, Ki Bom
    Bhatia, Rohit
    Saltaformaggio, Brendan
    Xu, Dongyan
    DIGITAL INVESTIGATION, 2017, 23 : 50 - 62
  • [7] Acquisition and Elaboration of Cardiac Signal in Android Smartphone Devices
    De Dominicis, C. M.
    Depari, A.
    Flammini, A.
    Rinaldi, S.
    Sisinni, E.
    Vezzoli, A.
    2014 IEEE SENSORS APPLICATIONS SYMPOSIUM (SAS), 2014, : 83 - 88
  • [8] Practicability Study of Android Volatile Memory Forensic Research
    Waechter, Philipp
    Gruhn, Michael
    2015 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2015,
  • [9] DroidPerf: Profiling Memory Objects on Android Devices
    Li, Bolun
    Zhao, Qidong
    Jiao, Shuyin
    Liu, Xu
    PROCEEDINGS OF THE 29TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, MOBICOM 2023, 2023, : 75 - 89
  • [10] Private Data Acquisition Method Based on System-Level Data Migration and Volatile Memory Forensics for Android Applications
    Feng, Peijun
    Li, Qingbao
    Zhang, Ping
    Chen, Zhifeng
    IEEE ACCESS, 2019, 7 : 16695 - 16703