0% found this document useful (0 votes)
312 views12 pages

Android Forensics: Guide: Ms. Pooja Shah

This document provides an overview of Android forensics. It discusses that Android is an open source mobile operating system based on the Linux kernel. It then describes mobile device forensics and explains that Android devices are commonly used to manage personal data, payments, and more. The document outlines some crimes that may involve Android devices, such as software theft, terrorism, and child pornography. It also discusses challenges in Android forensics like data preservation and volatile data acquisition. Finally, it provides a list of the types of data that can be recovered from Android devices, such as text messages, photos, location history and financial information.

Uploaded by

neetu yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
312 views12 pages

Android Forensics: Guide: Ms. Pooja Shah

This document provides an overview of Android forensics. It discusses that Android is an open source mobile operating system based on the Linux kernel. It then describes mobile device forensics and explains that Android devices are commonly used to manage personal data, payments, and more. The document outlines some crimes that may involve Android devices, such as software theft, terrorism, and child pornography. It also discusses challenges in Android forensics like data preservation and volatile data acquisition. Finally, it provides a list of the types of data that can be recovered from Android devices, such as text messages, photos, location history and financial information.

Uploaded by

neetu yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Android Forensics

Guide :
Ms. Pooja Shah

BY
Neetu Yadav
(13mcei12)

ANDROID
Open Source mobile device operating system
Linux 2.6 kernel
Dalvik Virtual Machine
ARM architecture
Kernal Enhancements for Android
C library called BIONIC
YAFFS flash file system

Mobile Device Forensics


Mobile device forensicsis a branch ofdigital
forensicsrelating to recovery ofdigital
evidenceor data from amobile
deviceunderforensicallysound conditions.

Motivation
Android enabled mobile phones often used to :
Manage personal data
Perform Variety of tasks
Receive one time passwords
Synch to e-mail accounts
Perform e-commerce transactions
Payment of house hold Bills
Fund Transfer
Internet of things
Apps with unecessary permissions

Crimes Related with Android


Devices(used as a tool)
Software Theft(codebase)
Terrorist Activities
Financial Crimes
Murder Cases
Pornography/Child Pornography
Sexual Harassment Cases

Crimes Related with Android


Devices(as a target)
Mobile apps to launch phishing and Trojan

attacks
SpyEye , Zeus v2, Citadel , Bugat v2
Malicious Repackaged Applications
Under-regulated app market
Long lists of permissions that apps dont need

Malicious Application Repackaging

Data found on the Android devices


Text messages

(SMS/MMS)
Contacts
Call logs
E-mail messages
Instant messenger/
Chat
GPS coordinates
Photos/ Video

Driving directions
Social media clients

(Facebook, Twitter)
Calendar appointments
Financial information
Shopping history
Music collection files and
files sharing (Hoog,
2011).

Fine grain user Control


Giving the User more control
Decide the extent of access to data
Ability to deny access permission and still use
app
Customize the data accessed by the
application using stored samples

Challenges
Data Preservation
Data stored in the network
Decompiling the .apk file
Volatile data acquisition
Isolating the device (wireless connections)
No Modification to target device
Implications of granting specific permissions
Removing access right of an app crashes it
Malware in apps from android market(detection)

References
1. Giving the User Control over Android

2.
3.
4.
5.

Permissions 6.858 Final Project - Fall 2012


,Jonas Helfer & Ty Lin
fhelfer,ty12g@mit.edu,December 15, 2012
http://www.isecauditors.com/sites/default/f
iles/files/OWASP_EU_Tour_2013_Bucharest_And
roid_reverse_engineering.pdf
http://www.fortiguard.com/files/InsomnihackRuchna-Final.pdf
http://digitalforensics.sans.org/blog/2011/06
/09/android-mobile-malware-analysis-article
http://dl.packetstormsecurity.net/papers/pre

Thank You

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy