Forensic Recovery of Scrambled Telephones

نویسندگان

  • Tilo Müller
  • Michael Spreitzenbarth
  • Felix C. Freiling
چکیده

At the end of 2011, Google released version 4.0 of its Android operating system for smartphones. For the first time, Android smartphone owners were supplied with a disk encryption feature that transparently scrambles user partitions, thus protecting sensitive user information against targeted attacks that bypass screen locks. On the downside, scrambled telephones are a a nightmare for IT forensics and law enforcement, because once the power of a scrambled device is cut any chance other than bruteforce is lost to recover data. In this paper we present Frost, a tool set that supports the forensic recovery of scrambled telephones. To this end we perform cold boot attacks against Android smartphones and retrieve disk encryption keys from RAM. We show that cold boot attacks against Android phones are generally possible for the first time, and we perform our attacks practically against Galaxy Nexus devices from Samsung. To break disk encryption, the bootloader must be unlocked before the attack because scrambled user partitions are wiped during unlocking. However, we show that cold boot attacks are more generic and allow to retrieve sensitive information, such as contact lists, visited web sites, and photos, directly from RAM, even though the bootloader is locked.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A two-stage stochastic rule-based model to determine pre-assembly buffer content

This study considers instant decision-making needs of the automobile manufactures for resequencing vehicles before final assembly (FA). We propose a rule-based two-stage stochastic model to determine the number of spare vehicles that should be kept in the pre-assembly buffer to restore the altered sequence due to paint defects and upstream department constraints. First stage of the model decide...

متن کامل

Forensic Sound Analyses of Cellular Telephone Recordings

Recordings involving cellular telephones or personal digital assistants (“PDAs”) are increasingly the source evidence in audio forensic examinations, compared to recordings originating with other devices such as hand-held digital recorders. On modern PDA cellular telephones recordings can be made either directly to the telephone or transmitted as voice mail messages. The current investigation f...

متن کامل

Data Recovery Function Testing for Digital Forensic Tools

Many digital forensic tools used by investigators were not originally designed for forensic applications. Even in the case of tools created with the forensic process in mind, there is the issue of assuring their reliability and dependability. Given the nature of investigations and the fact that the data collected and analyzed by the tools must be presented as evidence, it is important that digi...

متن کامل

Comparison of the Modified QuEChERS Method and the Conventional Method of Extraction in Forensic Medicine to Detect Methadone in Post-Mortem Urine by GCMS

Background:Extraction of drugs is one of the biggest concerns and the most important part of preparation and determination in forensic medicine. The lack of an easy, efficient and fast extraction method is the most important and most difficult problem despite the development of forensic centers and their being equipped with new diagnostic devices. In the present study, a comparison was conducte...

متن کامل

The risks, needs and stages of recovery of a complete forensic patient cohort in an Australian state

BACKGROUND Routine outcome measures are increasingly being mandated across mental health services in Australia and overseas. This requirement includes forensic mental health services, but their utility in such specialist services and the inter-relationships between the measures remain unclear. This study sought to characterise the risks, needs and stages of recovery of an entire cohort of foren...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012