Android Forensics: Guide: Ms. Pooja Shah
Android Forensics: Guide: Ms. Pooja Shah
Guide :
Ms. Pooja Shah
BY
Neetu Yadav
(13mcei12)
ANDROID
Open Source mobile device operating system
Linux 2.6 kernel
Dalvik Virtual Machine
ARM architecture
Kernal Enhancements for Android
C library called BIONIC
YAFFS flash file system
Motivation
Android enabled mobile phones often used to :
Manage personal data
Perform Variety of tasks
Receive one time passwords
Synch to e-mail accounts
Perform e-commerce transactions
Payment of house hold Bills
Fund Transfer
Internet of things
Apps with unecessary permissions
attacks
SpyEye , Zeus v2, Citadel , Bugat v2
Malicious Repackaged Applications
Under-regulated app market
Long lists of permissions that apps dont need
(SMS/MMS)
Contacts
Call logs
E-mail messages
Instant messenger/
Chat
GPS coordinates
Photos/ Video
Driving directions
Social media clients
(Facebook, Twitter)
Calendar appointments
Financial information
Shopping history
Music collection files and
files sharing (Hoog,
2011).
Challenges
Data Preservation
Data stored in the network
Decompiling the .apk file
Volatile data acquisition
Isolating the device (wireless connections)
No Modification to target device
Implications of granting specific permissions
Removing access right of an app crashes it
Malware in apps from android market(detection)
References
1. Giving the User Control over Android
2.
3.
4.
5.
Thank You