Automated forensic analysis of mobile applications on Android devices

被引:14
|
作者
Lin, Xiaodong [1 ]
Chen, Ting [2 ]
Zhu, Tong [3 ]
Yang, Kun [2 ]
Wei, Fengguo [4 ]
机构
[1] Wilfrid Laurier Univ, Waterloo, ON, Canada
[2] Univ Elect Sci & Technol China, Ctr Cyber Secur, Chengdu, Sichuan, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Sichuan, Peoples R China
[4] Univ S Florida, Tampa, FL 33620 USA
基金
加拿大自然科学与工程研究理事会;
关键词
Automated forensic analysis; Android applications; Inter-component static analysis; Taint analysis;
D O I
10.1016/j.diin.2018.04.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is not uncommon that mobile phones are involved in criminal activities, e.g., the surreptitious collection of credit card information. Forensic analysis of mobile applications plays a crucial part in order to gather evidences against criminals. However, traditional forensic approaches, which are based on manual investigation, are not scalable to the large number of mobile applications. On the other hand, dynamic analysis is hard to automate due to the burden of setting up the proper runtime environment to accommodate OS differences and dependent libraries and activate all feasible program paths. We propose a fully automated tool, Fordroid for the forensic analysis of mobile applications on Android. Fordroid conducts inter-component static analysis on Android APKs and builds control flow and data dependency graphs. Furthermore, Fordroid identifies what and where information written in local storage with taint analysis. Data is located by traversing the graphs. This addresses several technique challenges, which include inter-component string propagation, string operations (e.g., append) and API invocations. Also, Fordroid identifies how the information is stored by parsing SQL commands, i.e., the structure of database tables. Finally, we selected 100 random Android applications consisting of 2841 components from four categories for evaluation. Analysis of all apps took 64 h. Fordroid discovered 469 paths in 36 applications that wrote sensitive information (e.g., GPS) to local storage. Furthermore, Fordroid successfully located where the information was written for 458 (98%) paths and identified the structure of all (22) database tables. (C) 2018 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.
引用
收藏
页码:S59 / S66
页数:8
相关论文
共 50 条
  • [1] Forensic Analysis of Android Mobile Devices
    Rao, V. Venkateswara
    Chakravarthy, A. S. N.
    2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2016,
  • [2] Towards a Forensic Analysis of Mobile Devices Using Android
    Gomez-Torres, Estevan
    Moscoso-Zea, Oswaldo
    Herrera Herrera, Nelson
    Lujan-Mora, Sergio
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY & SYSTEMS (ICITS 2018), 2018, 721 : 30 - 39
  • [3] Forensic Analysis of Dating Applications on Android and iOS Devices
    Hutchinson, Shinelle
    Shantaram, Neesha
    Karabiyik, Umit
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 837 - 848
  • [4] An analysis of automated tests for mobile Android applications
    Silva, Davi Bernardo
    Endo, Andre Takeshi
    Eler, Marcelo Medeiros
    Durelli, Vinicius H. S.
    PROCEEDINGS OF THE 2016 XLII LATIN AMERICAN COMPUTING CONFERENCE (CLEI), 2016,
  • [5] The Android Forensics Automator (AnForA): A tool for the Automated Forensic Analysis of Android Applications
    Anglano, Cosimo
    Canonico, Massimo
    Guazzone, Marco
    COMPUTERS & SECURITY, 2020, 88 (88)
  • [6] A Forensic Investigation of Android Mobile Applications
    Kitsaki, Theodoula-Ioanna
    Angelogianni, Anna
    Ntantogian, Christoforos
    Xenakis, Christos
    22ND PAN-HELLENIC CONFERENCE ON INFORMATICS (PCI 2018), 2018, : 58 - 63
  • [7] Automated Analysis Method for Forensic Investigation of Cloud Applications on Android
    Daryabar, Farid
    Tadayon, Mohammad Hesam
    Parsi, Ashkan
    2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 145 - 150
  • [8] Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices
    Kim, Dohyun
    Lee, Yunho
    Lee, Sangjin
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (12): : 6618 - 6632
  • [9] Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices
    Dohyun Kim
    Yunho Lee
    Sangjin Lee
    The Journal of Supercomputing, 2018, 74 : 6618 - 6632
  • [10] Evaluating the privacy of Android mobile applications under forensic analysis
    Ntantogian, Christoforos
    Apostolopoulos, Dimitris
    Marinakis, Giannis
    Xenakis, Christos
    COMPUTERS & SECURITY, 2014, 42 : 66 - 76