A flexible framework for mobile device forensics based on cold boot attacks

被引:4
作者
Huber, Manuel [1 ]
Taubmann, Benjamin [2 ]
Wessel, Sascha [1 ]
Reiser, Hans P. [2 ]
Sigl, Georg [3 ]
机构
[1] Fraunhofer Res Inst AISEC, Munich, Germany
[2] Univ Passau, Passau, Germany
[3] Tech Univ Munich, Munich, Germany
来源
EURASIP JOURNAL ON INFORMATION SECURITY | 2016年 / 1卷
关键词
Cold boot attack; Digital forensics; Data acquisition; Mobile device security; Android; Smartphones; Virtual machine introspection;
D O I
10.1186/s13635-016-0041-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to access arbitrary data in main memory is the cold boot attack. The cold boot attack exploits the remanence effect that causes data in DRAM modules not to lose the content immediately in case of a power cut-off. This makes it possible to restart a device and extract the data in main memory. In this paper, we present a novel framework for cold boot-based data acquisition with a minimal bare metal application on a mobile device. In contrast to other cold boot approaches, our forensics tool overwrites only a minimal amount of data in main memory. This tool requires no more than three kilobytes of constant data in the kernel code section. We hence sustain all of the data relevant for the analysis of the previously running system. This makes it possible to analyze the memory with data acquisition tools. For this purpose, we extend the memory forensics tool Volatility in order to request parts of the main memory dynamically from our bare metal application. We show the feasibility of our approach on the Samsung Galaxy S4 and Nexus 5 mobile devices along with an extensive evaluation. First, we compare our framework to a traditional memory dump-based analysis. In the next step, we show the potential of our framework by acquiring sensitive user data.
引用
收藏
页数:13
相关论文
共 28 条
  • [1] Review of Digital Forensic Investigation frameworks
    Agarwal, Ritu
    Kothari, Suvarna
    [J]. Lecture Notes in Electrical Engineering, 2015, 339 : 561 - 571
  • [2] Apostolopoulos D., 2013, C E BUS E SERV E SOC C E BUS E SERV E SOC, P178
  • [3] Becher M., 2005, CANSECWEST
  • [4] Carbone R., 2011, IN DEPTH ANAL COLD B
  • [5] Chan EM, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P555
  • [6] Chen PM, 2001, EIGHTH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS, PROCEEDINGS, P133
  • [7] Colp P, 2015, ACM SIGPLAN NOTICES, V50, P177, DOI [10.1145/2775054.2694380, 10.1145/2694344.2694380]
  • [8] Devine C, 2009, P SSTIC 09
  • [9] Gotzfried Johannes, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P161, DOI 10.1109/ARES.2013.23
  • [10] Gruhn Michael, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P390, DOI 10.1109/ARES.2013.52