Evaluating the privacy of Android mobile applications under forensic analysis
نویسندگان
چکیده
In this paper, we investigate and evaluate through experimental analysis the possibility of recovering authentication credentials of mobile applications from the volatile memory of Android mobile devices. Throughout the carried experiments and analysis, we have, exclusively, used open-source and free forensic tools. Overall, the contribution of this paper is threefold. First, it thoroughly, examines thirteen (13) mobile applications, which represent four common application categories that elaborate sensitive users’ data, whether it is possible to recover authentication credentials from the physical memory of mobile devices, following thirty (30) different scenarios. Second, it explores in the considered applications, if we can discover patterns and expressions that indicate the exact position of authentication credentials in a memory dump. Third, it reveals a set of critical observations regarding the privacy of Android mobile applications and devices.
منابع مشابه
Does the Android Permission System Provide Adequate Information Privacy Protection for End-users of Mobile Apps?
This paper investigates the Android permission system and its adequacy in alerting end-users of potential information privacy risks in an app. When an end-user seeks to install an app, they are presented with the required permissions and make a supposedly informed decision as to whether to install that app based on the permissions presented. The results from an analysis of ten popular apps indi...
متن کاملDroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android
Smart mobile devices process and store a vast amount of securityand privacy sensitive data. To protect this data from malicious applications mobile operating systems, such as Android, adopt finegrained access control architectures. However, related work has shown that these access control architectures are susceptible to applicationlayer privilege escalation attacks. Both automated static and d...
متن کاملNetwork and device forensic analysis of Android social-messaging applications
In this research we forensically acquire and analyze the device-stored data and network traffic of 20 popular instant messaging applications for Android. We were able to reconstruct some or the entire message content from 16 of the 20 applications tested, which reflects poorly on the security and privacy measures employed by these applications but may be construed positively for evidence collec...
متن کاملDroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper)
Smart mobile devices process and store a vast amount of securityand privacy sensitive data. To protect this data from malicious applications mobile operating systems, such as Android, adopt finegrained access control architectures. However, related work has shown that these access control architectures are susceptible to applicationlayer privilege escalation attacks. Both automated static and d...
متن کاملAndroid Malware Analysis Based On Memory Forensics
Live forensics solutions have long been proven powerful in various research fields. The rise of mobile platforms has created numerous new challenges for the researchers. The adoption of the widely used technologies of the traditional PC environment has limitations due to the lack of wider control over the mobile operating system. In this paper we present a new malware analysis solution for the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 42 شماره
صفحات -
تاریخ انتشار 2014