Automated forensic analysis of mobile applications on Android devices

被引:14
|
作者
Lin, Xiaodong [1 ]
Chen, Ting [2 ]
Zhu, Tong [3 ]
Yang, Kun [2 ]
Wei, Fengguo [4 ]
机构
[1] Wilfrid Laurier Univ, Waterloo, ON, Canada
[2] Univ Elect Sci & Technol China, Ctr Cyber Secur, Chengdu, Sichuan, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Sichuan, Peoples R China
[4] Univ S Florida, Tampa, FL 33620 USA
基金
加拿大自然科学与工程研究理事会;
关键词
Automated forensic analysis; Android applications; Inter-component static analysis; Taint analysis;
D O I
10.1016/j.diin.2018.04.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is not uncommon that mobile phones are involved in criminal activities, e.g., the surreptitious collection of credit card information. Forensic analysis of mobile applications plays a crucial part in order to gather evidences against criminals. However, traditional forensic approaches, which are based on manual investigation, are not scalable to the large number of mobile applications. On the other hand, dynamic analysis is hard to automate due to the burden of setting up the proper runtime environment to accommodate OS differences and dependent libraries and activate all feasible program paths. We propose a fully automated tool, Fordroid for the forensic analysis of mobile applications on Android. Fordroid conducts inter-component static analysis on Android APKs and builds control flow and data dependency graphs. Furthermore, Fordroid identifies what and where information written in local storage with taint analysis. Data is located by traversing the graphs. This addresses several technique challenges, which include inter-component string propagation, string operations (e.g., append) and API invocations. Also, Fordroid identifies how the information is stored by parsing SQL commands, i.e., the structure of database tables. Finally, we selected 100 random Android applications consisting of 2841 components from four categories for evaluation. Analysis of all apps took 64 h. Fordroid discovered 469 paths in 36 applications that wrote sensitive information (e.g., GPS) to local storage. Furthermore, Fordroid successfully located where the information was written for 458 (98%) paths and identified the structure of all (22) database tables. (C) 2018 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.
引用
收藏
页码:S59 / S66
页数:8
相关论文
共 50 条
  • [41] An Automated Pipeline for Privacy Leak Analysis of Android Applications
    Zhou, Yifan
    2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING ASE 2021, 2021, : 1048 - 1050
  • [42] Dynaldroid : A System for Automated Dynamic Analysis of Android Applications
    Reddy, K. P.
    Rajesh, Babu, V
    Pareek, Himanshu
    Patil, Mahesh U.
    2015 NATIONAL CONFERENCE ON RECENT ADVANCES IN ELECTRONICS & COMPUTER ENGINEERING (RAECE), 2015, : 124 - 129
  • [43] Behavioral Analysis of Android Applications Using Automated Instrumentation
    Karami, Mohammad
    Elsabagh, Mohamed
    Najafiborazjani, Parnian
    Stavrou, Angelos
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, : 183 - 188
  • [44] Android Mobile Forensic Analyzer for Stegno data
    Mambodza, Walter T.
    Meeran, Nagoor A. R.
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [45] Logical acquisition and analysis of data from android mobile devices
    Srivastava, Himanshu
    Tapaswi, Shashikala
    INFORMATION AND COMPUTER SECURITY, 2015, 23 (05) : 450 - 475
  • [46] Energy Consumption Analysis of Video Streaming to Android Mobile Devices
    Trestian, Ramona
    Moldovan, Arghir-Nicolae
    Ormond, Olga
    Muntean, Gabriel-Miro
    2012 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2012, : 444 - 452
  • [47] Automated Software Testing on Mobile Applications: A Review with Special Focus on Android Platform
    Musthafa, Fathima Naja
    Mansur, Syeda
    Wibawanto, Adika
    2020 20TH INTERNATIONAL CONFERENCE ON ADVANCES IN ICT FOR EMERGING REGIONS (ICTER-2020), 2020, : 292 - 293
  • [48] Forensic Analysis of TikTok Alternatives on Android and iOS Devices: Byte, Dubsmash, and Triller
    Keim, Yansi
    Hutchinson, Shinelle
    Shrivastava, Apoorva
    Karabiyik, Umit
    ELECTRONICS, 2022, 11 (18)
  • [49] NFC Logging Mechanism-Forensic Analysis of NFC Artefacts on Android Devices
    Lakshmanan, Divya
    Meeran, A. R. Nagoor
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2016, 2017, 517 : 93 - 101
  • [50] Extension of the PingER Project onto Mobile Devices using Android. Applications
    Jain, Aayush
    David, James
    Sabitha, A. Sai
    Cottrell, Les
    White, Bebo
    Bansal, Abhay
    Bansal, Rishabh
    2019 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2019), 2019, : 630 - 635