Evaluating the privacy of Android mobile applications under forensic analysis

被引:20
|
作者
Ntantogian, Christoforos [1 ]
Apostolopoulos, Dimitris [1 ]
Marinakis, Giannis [1 ]
Xenakis, Christos [1 ]
机构
[1] Univ Piraeus, Dept Digital Syst, Piraeus, Greece
关键词
Privacy of mobile applications; Mobile forensics; Android; Memory dump; Mobile applications; Volatile memory; Authentication credentials;
D O I
10.1016/j.cose.2014.01.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate and evaluate through experimental analysis the possibility of recovering authentication credentials of mobile applications from the volatile memory of Android mobile devices. Throughout the carried experiments and analysis, we have, exclusively, used open-source and free forensic tools. Overall, the contribution of this paper is threefold. First, it thoroughly, examines thirteen (13) mobile applications, which represent four common application categories that elaborate sensitive users' data, whether it is possible to recover authentication credentials from the physical memory of mobile devices, following thirty (30) different scenarios. Second, it explores in the considered applications, if we can discover patterns and expressions that indicate the exact position of authentication credentials in a memory dump. Third, it reveals a set of critical observations regarding the privacy of Android mobile applications and devices. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:66 / 76
页数:11
相关论文
共 50 条
  • [41] Android Forensic and Security Assessment for Hospital and Stock-and-Trade Applications in Thailand
    Phumkaew, Noppanat
    Visoottiviseth, Vasaka
    2018 15TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2018, : 56 - 61
  • [42] Micro-agents on Android: Interfacing Agents with Mobile Applications
    Frantz, Christopher
    Nowostawski, Mariusz
    Purvis, Martin K.
    ADVANCED AGENT TECHNOLOGY, 2012, 7068 : 488 - 502
  • [43] Empirical Study on REST APIs Usage in Android Mobile Applications
    Oumaziz, Mohamed A.
    Belkhir, Abdelkarim
    Vacher, Tristan
    Beaudry, Eric
    Blanc, Xavier
    Falleri, Jean-Remy
    Moha, Naouel
    SERVICE-ORIENTED COMPUTING, ICSOC 2017, 2017, 10601 : 614 - 622
  • [44] CUPA : A Configurable User Privacy Approach For Android Mobile Application
    Alkindi, Zainab
    Sarrab, Mohamed
    Alzidi, Nasser
    2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020), 2020, : 216 - 221
  • [45] Privacy Risk Assessment for SQLite Based Android Applications
    Yeh, Kuo-Hui
    Hou, Jia-Li
    Chen, Lin-Chih
    Liao, Hao-Xiang
    Yang, Wei-Pang
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (07): : 1533 - 1541
  • [46] Privacy-Enhanced Android for Smart Cities Applications
    Lepinski, Matthew
    Levin, David
    McCarthy, Daniel
    Watro, Ronald
    Lack, Michael
    Hallenbeck, Daniel
    Slater, David
    SMART CITY 360, 2016, 166 : 66 - 77
  • [47] Poster: Evaluating Android Applications with Multipath TCP
    De Coninck, Quentin
    Baerts, Matthieu
    Hesmans, Benjamin
    Bonaventure, Olivier
    MOBICOM '15: PROCEEDINGS OF THE 21ST ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2015, : 230 - 232
  • [48] Forensic analysis of BiP Messenger on android smartphones
    Akbal, Erhan
    Baloglu, Ibrahim
    Tuncer, Turker
    Dogan, Sengul
    AUSTRALIAN JOURNAL OF FORENSIC SCIENCES, 2020, 52 (05) : 590 - 609
  • [49] Overview of potential forensic analysis of an Android smartphone
    Sack, Stefan
    Kroeger, Knut
    Creutzburg, Reiner
    MULTIMEDIA ON MOBILE DEVICES 2012 AND MULTIMEDIA CONTENT ACCESS: ALGORITHMS AND SYSTEMS VI, 2012, 8304
  • [50] Forensic analysis of Email on Android volatile Memory
    Chen, Long
    Mao, Yue
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 945 - 951