Evaluating the Reliability of Android Userland Memory Forensics

被引:0
|
作者
Sudhakaran, Sneha [1 ]
Ali-Gombe, Aisha [2 ]
Case, Andrew [3 ]
Richard, Golden G., III [1 ]
机构
[1] Louisiana State Univ, Dept Comp Sci, Baton Rouge, LA 70803 USA
[2] Towson Univ, Dept Comp Sci, Towson, MD USA
[3] Volatil Fdn, Board Directors, Reston, VA USA
关键词
Userland; Memory Dump Acquisition; Reliability; Metric Evaluation; VOLATILE MEMORY; ACQUISITION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Memory Forensics is one of the most important emerging areas in computer forensics. In memory forensics, analysis of userland memory is a technique that analyses per-process runtime data structures and extracts significant evidence for application-specific investigations. In this research, our focus is to examine the critical challenges faced by process memory acquisition that can impact object and data recovery. Particularly, this research work seeks to address the issues of consistency and reliability in userland memory forensics on Android. In real-world investigations, memory acquisition tools record the information when the device is running. In such scenarios, each application's memory content may be in flux due to updates that are in progress, garbage collection activities, changes in process states, etc. In this paper we focus on various runtime activities such as garbage collection and process states and the impact they have on object recovery in userland memory forensics. The outcome of the research objective is to assess the reliability of Android userland memory forensic tools by providing new research directions for efficiently developing a metric study to measure the reliability. We evaluated our research objective by analysing memory dumps acquired from 30 apps in different Process Acquisition Modes. The Process Acquisition Mode (PAM) is the memory dump of a process that is extracted while external runtime factors are triggered. Our research identified an inconsistency in the number of objects recovered from analysing the process memory dumps with runtime factors included. Particularly, the evaluation results revealed differences in the count of objects recovered in different acquisition modes. We utilized Euclidean distance and covariance as the metrics for our study. These two metrics enabled the authors to identify how the change in the number of recovered objects in PAM impact forensic analysis. Our conclusion revealed that runtime factors could on average result in about 20% data loss, thus revealing these factors can have an obvious impact on object recovery.
引用
收藏
页码:423 / 433
页数:11
相关论文
共 50 条
  • [31] Pokémon GO forensics: An android application analysis
    Sablatura J.
    Karabiyik U.
    Sablatura, Joshua (jds088@shsu.edu), 2017, MDPI AG (08):
  • [32] Android Forensics Tools and Security Mechanism: Survey Paper
    Amer, Nisreen
    Al-Halabi, Yahia S.
    ICEMIS'18: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND MIS, 2018,
  • [33] Evidence Data Collection with ANDROSICS Tool for Android Forensics
    Htun, Naing Linn
    Thwin, Mie Mie Su
    San, Cho Cho
    PROCEEDINGS OF 2018 THE 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND ELECTRICAL ENGINEERING (ICITEE), 2018, : 353 - 358
  • [34] A General Forensics Acquisition for Android Smartphones with Qualcomm Processor
    Wu, Songyang
    Xiong, Xiong
    Zhang, Yong
    Tang, Yang
    Jin, Bo
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1984 - 1988
  • [35] Android anti-forensics through a local paradigm
    Distefano, Alessandro
    Me, Gianluigi
    Pace, Francesco
    DIGITAL INVESTIGATION, 2010, 7 : S83 - S94
  • [36] Automatic Content Inspection and Forensics for Children Android Apps
    Luo, Qian
    Liu, Jiajia
    Wang, Jiadai
    Tan, Yawen
    Cao, Yurui
    Kato, Nei
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08): : 7123 - 7134
  • [37] Research and development of memory forensics
    Zhang, Yu
    Liu, Qing-Zhong
    Li, Tao
    Wu, Li-Hua
    Shi, Chun
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (05): : 1151 - 1172
  • [38] Virtual Machine Memory Forensics
    Huseinovic, Alvin
    Ribic, Samir
    2013 21ST TELECOMMUNICATIONS FORUM (TELFOR), 2013, : 940 - 942
  • [39] The Research on Linux Memory Forensics
    Zhang, Jun
    Che, ShengBing
    2017 INTERNATIONAL SYMPOSIUM ON APPLICATION OF MATERIALS SCIENCE AND ENERGY MATERIALS (SAMSE 2017), 2018, 322
  • [40] Advances in volatile memory forensics
    Schatz, Bradley
    Cohen, Michael
    DIGITAL INVESTIGATION, 2017, 20 : 1 - 1