MIC: Memory analysis of IndexedDB data on Chromium-based applications

被引:0
|
作者
Jeong, Byeongchan [1 ]
Lee, Sangjin [1 ]
Park, Jungheum [1 ]
机构
[1] Korea Univ, Sch Cybersecur, Seoul, South Korea
来源
FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION | 2024年 / 50卷
关键词
Digital forensics; Memory forensics; Chromium-based applications; Incognito mode; IndexedDB LevelDB;
D O I
10.1016/j.fsidi.2024.301809
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As Chromium-based applications continue to gain popularity, it is necessary for forensic investigators to obtain a comprehensive understanding of how they store and manage browsing artifacts from both filesystem and memory perspectives. In particular, the incognito mode developed in the current version of Chromium uses only physical memory to manage data related to active sessions. Therefore, handling physical memory is essential for tracking a user's browsing behaviour in incognito mode. This paper provides an in-depth examination of LevelDB, a lightweight key-value database utilized as Chromium's implementation for IndexedDB. In particular, we delve into the details of how IndexedDB data is managed through LevelDB, taking into account its low-level database file format. Furthermore, we thoroughly explore the possibility of residual data, both complete and incomplete, being retained as applications create and initialize IndexedDB-related data. Based on our research findings, we propose a systematic methodology for inspecting the internal structures of LevelDB-related C++ classes, carving these structures from binary streams, and interpreting the data for forensic analysis. In addition, we develop a proof-of-concept tool based on our approach and demonstrate its performance and effectiveness through case studies.
引用
收藏
页数:9
相关论文
共 13 条
  • [1] Chracer: Memory analysis of Chromium-based browsers
    Choi, Geunyeong
    Bang, Jewan
    Lee, Sangjin
    Park, Jungheum
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2023, 46
  • [2] Memory analysis of .NET and .Net Core applications
    Manna, Modhuparna
    Case, Andrew
    Ali-Gombe, Aisha, III
    Richard, Golden G.
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2022, 42
  • [3] Data correlation-based analysis methods for automatic memory forensic
    Fu, X.
    Du, X.
    Luo, B.
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4213 - 4226
  • [4] Forensic analysis of communication records of messaging applications from physical memory
    Barradas, Diogo
    Brito, Tiago
    Duarte, David
    Santos, Nuno
    Rodrigues, Luis
    COMPUTERS & SECURITY, 2019, 86 : 484 - 497
  • [5] A Method of Android Application Forensics Based on Heap Memory Analysis
    Zhang, Junfu
    E, Chengyuan
    Hu, Aiqun
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2018), 2018,
  • [6] Hidden Process Offline Forensic Based on Memory Analysis in Windows
    CUI Jingsong
    ZHANG Heng
    QI Jing
    PENG Rong
    ZHANG Manli
    Wuhan University Journal of Natural Sciences, 2017, 22 (04) : 346 - 354
  • [7] Forensic analysis of ephemeral messaging applications: Disappearing messages or evidential data?
    Heath, Howard
    Macdermott, Aine
    Akinbi, Alex
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2023, 46
  • [8] An adaptive approach for Linux memory analysis based on kernel code reconstruction
    Zhang S.
    Meng X.
    Wang L.
    EURASIP Journal on Information Security, 2016 (1):
  • [9] Enhancing Virtual Machine Introspection-based Memory Analysis with Event Triggers
    Muscat, Matthew
    Vella, Mark
    2018 16TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2018), 2018, : 133 - 136
  • [10] A Volatile Memory Analysis Tool for Retrieval of Social Media Evidence in Windows 10 OS based Workstations
    Thantilage, Ranul
    Jeyamohan, Neera
    2017 NATIONAL INFORMATION TECHNOLOGY CONFERENCE (NITC), 2017, : 86 - 88