Evaluating the Reliability of Android Userland Memory Forensics

被引:0
|
作者
Sudhakaran, Sneha [1 ]
Ali-Gombe, Aisha [2 ]
Case, Andrew [3 ]
Richard, Golden G., III [1 ]
机构
[1] Louisiana State Univ, Dept Comp Sci, Baton Rouge, LA 70803 USA
[2] Towson Univ, Dept Comp Sci, Towson, MD USA
[3] Volatil Fdn, Board Directors, Reston, VA USA
关键词
Userland; Memory Dump Acquisition; Reliability; Metric Evaluation; VOLATILE MEMORY; ACQUISITION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Memory Forensics is one of the most important emerging areas in computer forensics. In memory forensics, analysis of userland memory is a technique that analyses per-process runtime data structures and extracts significant evidence for application-specific investigations. In this research, our focus is to examine the critical challenges faced by process memory acquisition that can impact object and data recovery. Particularly, this research work seeks to address the issues of consistency and reliability in userland memory forensics on Android. In real-world investigations, memory acquisition tools record the information when the device is running. In such scenarios, each application's memory content may be in flux due to updates that are in progress, garbage collection activities, changes in process states, etc. In this paper we focus on various runtime activities such as garbage collection and process states and the impact they have on object recovery in userland memory forensics. The outcome of the research objective is to assess the reliability of Android userland memory forensic tools by providing new research directions for efficiently developing a metric study to measure the reliability. We evaluated our research objective by analysing memory dumps acquired from 30 apps in different Process Acquisition Modes. The Process Acquisition Mode (PAM) is the memory dump of a process that is extracted while external runtime factors are triggered. Our research identified an inconsistency in the number of objects recovered from analysing the process memory dumps with runtime factors included. Particularly, the evaluation results revealed differences in the count of objects recovered in different acquisition modes. We utilized Euclidean distance and covariance as the metrics for our study. These two metrics enabled the authors to identify how the change in the number of recovered objects in PAM impact forensic analysis. Our conclusion revealed that runtime factors could on average result in about 20% data loss, thus revealing these factors can have an obvious impact on object recovery.
引用
收藏
页码:423 / 433
页数:11
相关论文
共 50 条
  • [1] Linux Memory Forensics: Expanding Rekall for Userland Investigation
    Stadlinger, Johannes
    Block, Frank
    Dewald, Andreas
    2018 11TH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT & IT FORENSICS (IMF 2018), 2018, : 27 - 46
  • [2] A Method of Android Application Forensics Based on Heap Memory Analysis
    Zhang, Junfu
    E, Chengyuan
    Hu, Aiqun
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2018), 2018,
  • [3] Memory Forensics of Insecure Android Inter-app Communications
    Vella, Mark
    Cilia, Rachel
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 481 - 486
  • [4] Android Digital Forensics - Simplifying Android Forensics Using Regular Expressions
    Jeyamohan, Neera
    2017 17TH INTERNATIONAL CONFERENCE ON ADVANCES IN ICT FOR EMERGING REGIONS (ICTER) - 2017, 2017, : 348 - 348
  • [5] Forensics Analysis of Private Web Browsing Using Android Memory Acquisition
    Younis, Lojin Bani
    Sweda, Safa
    Alzu'bi, Ahmad
    2021 12TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2021, : 273 - 278
  • [6] An Anti-forensics Method against Memory Acquiring for Android Devices
    Zheng, Jiamin
    Tan, Yu-An
    Zhang, Xiaosong
    Liang, Chen
    Zhang, Changyou
    Zheng, Jun
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 214 - 218
  • [7] Enhancing Reliability During Physical Memory Forensics: Strategies and Practices
    Kirmani M.S.
    Banday M.T.
    SN Computer Science, 5 (1)
  • [8] Android Forensics: Correlation Analysis
    Kasiaras, Dimitrios
    Zafeiropoulos, Thomas
    Clarke, Nathan
    Kambourakis, Georgios
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 157 - 162
  • [9] Android forensics: Interpretation of timestamps
    Kaart, M.
    Laraghy, S.
    DIGITAL INVESTIGATION, 2014, 11 (03) : 234 - 248
  • [10] On the Efficacy of Using Android Debugging Bridge for Android Device Forensics
    Easttom, Chuck
    Sanders, Willie
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 730 - 735