Evaluating the privacy of Android mobile applications under forensic analysis

被引:20
|
作者
Ntantogian, Christoforos [1 ]
Apostolopoulos, Dimitris [1 ]
Marinakis, Giannis [1 ]
Xenakis, Christos [1 ]
机构
[1] Univ Piraeus, Dept Digital Syst, Piraeus, Greece
关键词
Privacy of mobile applications; Mobile forensics; Android; Memory dump; Mobile applications; Volatile memory; Authentication credentials;
D O I
10.1016/j.cose.2014.01.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate and evaluate through experimental analysis the possibility of recovering authentication credentials of mobile applications from the volatile memory of Android mobile devices. Throughout the carried experiments and analysis, we have, exclusively, used open-source and free forensic tools. Overall, the contribution of this paper is threefold. First, it thoroughly, examines thirteen (13) mobile applications, which represent four common application categories that elaborate sensitive users' data, whether it is possible to recover authentication credentials from the physical memory of mobile devices, following thirty (30) different scenarios. Second, it explores in the considered applications, if we can discover patterns and expressions that indicate the exact position of authentication credentials in a memory dump. Third, it reveals a set of critical observations regarding the privacy of Android mobile applications and devices. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:66 / 76
页数:11
相关论文
共 50 条
  • [31] Forensic analysis of Sync.com and FlipDrive cloud applications on Android platform
    Bhat, Wasim Ahmad
    Jalal, Mohammad Faid
    Khan, Sajid Sajad
    Shah, Faiqah Farooq
    Wani, Mohamad Ahtisham
    FORENSIC SCIENCE INTERNATIONAL, 2019, 302
  • [32] Investigating Wearable Fitness Applications: Data Privacy and Digital Forensics Analysis on Android
    Hutchinson, Shinelle
    Mirza, Mohammad Meraj
    West, Nicholas
    Karabiyik, Umit
    Rogers, Marcus K.
    Mukherjee, Tathagata
    Aggarwal, Sudhir
    Chung, Haeyong
    Pettus-Davis, Carrie
    APPLIED SCIENCES-BASEL, 2022, 12 (19):
  • [33] Forensic analysis of WeChat on Android smartphones
    Wu, Songyang
    Zhang, Yong
    Wang, Xupeng
    Xiong, Xiong
    Du, Lin
    DIGITAL INVESTIGATION, 2017, 21 : 3 - 10
  • [34] Forensic Collection and Analysis of Thumbnails in Android
    Di Leom, Ming
    D'Orazio, Christian Javier
    Deegan, Gaye
    Choo, Kim-Kwang Raymond
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1059 - 1066
  • [35] Test Patterns for Android Mobile Applications
    Morgado, Ines Coimbra
    Paiva, Ana C. R.
    PROCEEDINGS OF THE 20TH EUROPEAN CONFERENCE ON PATTERN LANGUAGES OF PROGRAMS (EUROPLOP 2015), 2015,
  • [36] Accessibility Assessment in Mobile Applications for Android
    Acosta-Vargas, Patricia
    Salvador-Ullauri, Luis
    Jadan-Guerrero, Janio
    Guevara, Cesar
    Sanchez-Gordon, Sandra
    Calle-Jimenez, Tania
    Lara-Alvarez, Patricio
    Medina, Ana
    Nunes, Isabel L.
    ADVANCES IN HUMAN FACTORS AND SYSTEMS INTERACTION, 2020, 959 : 279 - 288
  • [37] A Comparative Study of Android and iOS Mobile Applications' Data Handling Practices Versus Compliance to Privacy Policy
    Kununka, Sophia
    Mehandjiev, Nikolay
    Sampaio, Pedro
    PRIVACY AND IDENTITY MANAGEMENT: THE SMART REVOLUTION, 2018, 526 : 301 - 313
  • [38] Analysis and evaluation of the Android best practices impact on the efficiency of mobile applications
    Tonini, Aline
    Fischer, Leonardo
    Mattos, Julio
    Brisolara, Lisane
    2013 III BRAZILIAN SYMPOSIUM ON COMPUTING SYSTEMS ENGINEERING (SBESC 2013), 2013, : 157 - 158
  • [39] Forensic Analysis of WhatsApp SQLite Databases on the Unrooted Android Phones
    Fayyad-Kazan H.
    Kassem-Moussa S.
    Hejase H.J.
    Hejase A.J.
    HighTech and Innovation Journal, 2022, 3 (02): : 175 - 195
  • [40] Forensic analysis of the ChatSecure instant messaging application on android smartphones
    Anglano, Cosimo
    Canonico, Massimo
    Guazzone, Marco
    DIGITAL INVESTIGATION, 2016, 19 : 44 - 59