A TOOL FOR VOLATILE MEMORY ACQUISITION FROM ANDROID DEVICES

被引:6
|
作者
Yang, Haiyu [1 ]
Zhuge, Jianwei [2 ]
Liu, Huiming [3 ]
Liu, Wei [3 ]
机构
[1] Tsinghua Univ, Thermal Engn, Beijing, Peoples R China
[2] Tsinghua Univ, Inst Network Sci & Cyberspace, Comp Sci, Beijing, Peoples R China
[3] Tsinghua Univ, Comp Sci, Beijing, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Mobile device forensics; memory forensics; Android; rootkit detection; FORENSICS;
D O I
10.1007/978-3-319-46279-0_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Memory forensic tools provide a thorough way to detect malware and investigate cyber crimes. However, existing memory forensic tools must be compiled against the exact version of the kernel source code and the exact kernel configuration. This poses a problem for Android devices because there are more than 1,000 manufacturers and each manufacturer maintains its own kernel. Moreover, new security enhancements introduced in Android Lollipop prevent most memory acquisition tools from executing. This chapter describes AMExtractor, a tool for acquiring volatile physical memory from a wide range of Android devices with high integrity. AMExtractor uses /dev/kmem to execute code in kernel mode, which is supported by most Android devices. Device-specific information is extracted at runtime without any assumptions about the target kernel source code and configuration. AMExtractor has been successfully tested on several devices shipped with different versions of the Android operating system, including the latest Android Lollipop. Memory images dumped by AMExtractor can be exported to other forensic frameworks for deep analysis. A rootkit was successfully detected using the Volatility Framework on memory images retrieved by AMExtractor.
引用
收藏
页码:365 / 378
页数:14
相关论文
共 50 条
  • [21] A code protection scheme by process memory relocation for android devices
    Zhang, Xiaosong
    Tan, Yu-an
    Zhang, Changyou
    Xue, Yuan
    Li, Yuanzhang
    Zheng, Jun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 11137 - 11157
  • [22] Exfiltrating data from Android devices
    Do, Quang
    Martini, Ben
    Choo, Kim-Kwang Raymond
    COMPUTERS & SECURITY, 2015, 48 : 74 - 91
  • [23] Forensics Analysis of Private Web Browsing Using Android Memory Acquisition
    Younis, Lojin Bani
    Sweda, Safa
    Alzu'bi, Ahmad
    2021 12TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2021, : 273 - 278
  • [24] Tunable synaptic working memory with volatile memristive devices
    Ricci, Saverio
    Kappel, David
    Tetzlaff, Christian
    Ielmini, Daniele
    Covi, Erika
    NEUROMORPHIC COMPUTING AND ENGINEERING, 2023, 3 (04):
  • [25] Bioorganic nanodots for non-volatile memory devices
    Amdursky, Nadav
    Shalev, Gil
    Handelman, Amir
    Litsyn, Simon
    Natan, Amir
    Roizin, Yakov
    Rosenwaks, Yossi
    Szwarcman, Daniel
    Rosenman, Gil
    APL MATERIALS, 2013, 1 (06):
  • [26] Graphene Based Non-Volatile Memory Devices
    Wang, Xiaomu
    Xie, Weiguang
    Xu, Jian-Bin
    ADVANCED MATERIALS, 2014, 26 (31) : 5496 - 5503
  • [27] Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation
    Thing, Vrizlynn L. L.
    Chua, Zheng-Leong
    SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 217 - 230
  • [28] DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction
    Ali-Gombe, Aisha
    Sudhakaran, Sneha
    Case, Andrew
    Richard, Golden G., III
    PROCEEDINGS OF THE 22ND INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, 2019, : 547 - 559
  • [29] Bubble memory devices: An experience in data acquisition systems
    Kalmani, S.D.
    Satyanarayana, B.
    Mittal, R.P.
    Hayashi, Y.
    Kawakami, S.
    IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), 1988, 5 (10): : 417 - 425
  • [30] SentinAir system software: A flexible tool for data acquisition from heterogeneous sensors and devices
    Suriano, Domenico
    SOFTWAREX, 2020, 12 (12)