Evaluating the Reliability of Android Userland Memory Forensics

被引:0
|
作者
Sudhakaran, Sneha [1 ]
Ali-Gombe, Aisha [2 ]
Case, Andrew [3 ]
Richard, Golden G., III [1 ]
机构
[1] Louisiana State Univ, Dept Comp Sci, Baton Rouge, LA 70803 USA
[2] Towson Univ, Dept Comp Sci, Towson, MD USA
[3] Volatil Fdn, Board Directors, Reston, VA USA
关键词
Userland; Memory Dump Acquisition; Reliability; Metric Evaluation; VOLATILE MEMORY; ACQUISITION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Memory Forensics is one of the most important emerging areas in computer forensics. In memory forensics, analysis of userland memory is a technique that analyses per-process runtime data structures and extracts significant evidence for application-specific investigations. In this research, our focus is to examine the critical challenges faced by process memory acquisition that can impact object and data recovery. Particularly, this research work seeks to address the issues of consistency and reliability in userland memory forensics on Android. In real-world investigations, memory acquisition tools record the information when the device is running. In such scenarios, each application's memory content may be in flux due to updates that are in progress, garbage collection activities, changes in process states, etc. In this paper we focus on various runtime activities such as garbage collection and process states and the impact they have on object recovery in userland memory forensics. The outcome of the research objective is to assess the reliability of Android userland memory forensic tools by providing new research directions for efficiently developing a metric study to measure the reliability. We evaluated our research objective by analysing memory dumps acquired from 30 apps in different Process Acquisition Modes. The Process Acquisition Mode (PAM) is the memory dump of a process that is extracted while external runtime factors are triggered. Our research identified an inconsistency in the number of objects recovered from analysing the process memory dumps with runtime factors included. Particularly, the evaluation results revealed differences in the count of objects recovered in different acquisition modes. We utilized Euclidean distance and covariance as the metrics for our study. These two metrics enabled the authors to identify how the change in the number of recovered objects in PAM impact forensic analysis. Our conclusion revealed that runtime factors could on average result in about 20% data loss, thus revealing these factors can have an obvious impact on object recovery.
引用
收藏
页码:423 / 433
页数:11
相关论文
共 50 条
  • [21] Validation of Digital Forensics Tools for Android Tablet
    Salleh, Razana Md
    Mohd, Masnizah
    Khalid, Kamarul Baharin
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2014, 9 (01): : 19 - 26
  • [22] Windows memory forensics
    Ruff, Nicolas
    JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (02): : 83 - 100
  • [23] Android forensics: Simplifying cell phone examinations
    Lessad, Jeff
    Kessler, Gary C.
    Small Scale Digital Device Forensics Journal, 2013, 4 (01):
  • [24] Hypervisor Memory Forensics
    Graziano, Mariano
    Lanzi, Andrea
    Balzarotti, Davide
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 21 - 40
  • [25] An Android Social App Forensics Adversary Model
    Azfar, Abdullah
    Choo, Kim-Kwang Raymond
    Liu, Lin
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 5597 - 5606
  • [26] Primary Exploration of Reliability Evaluation of Computer Live Forensics Model on Physical Memory Analysis
    Lian-Hai Wang
    Qiu-Liang Xu
    Journal of Harbin Institute of Technology(New series), 2014, (04) : 121 - 128
  • [27] The Android Forensics Automator (AnForA): A tool for the Automated Forensic Analysis of Android Applications
    Anglano, Cosimo
    Canonico, Massimo
    Guazzone, Marco
    COMPUTERS & SECURITY, 2020, 88 (88)
  • [28] Proposed package type for evaluating reliability of HBM Memory
    Lee, Dongsoo
    Bae, G. H.
    Bae, J. S.
    Lee, N. H.
    Lee, Y. S.
    Ko, S. B.
    SOLID-STATE ELECTRONICS, 2024, 216
  • [29] Android Forensics Analysis: Private Chat on Social Messenger
    Satrya, G. B.
    Daely, P. T.
    Shin, S. Y.
    2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2016, : 430 - 435
  • [30] A Dynamic Taint Analysis Tool for Android App Forensics
    Xu, Zhen
    Shi, Chen
    Cheng, Chris Chao-Chun
    Gong, Neil Zhengqiang
    Guan, Yong
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 160 - 169