首页> 外文期刊>Computers & Security >Breaking into the vault: Privacy, security and forensic analysis of Android vault applications
【24h】

Breaking into the vault: Privacy, security and forensic analysis of Android vault applications

机译:闯入保险库:Android保险库应用程序的隐私,安全性和取证分析

获取原文
获取原文并翻译 | 示例

摘要

In this work we share the first account for the forensic analysis, security and privacy of Android vault applications. Vaults are designed to be privacy enhancing as they allow users to hide personal data but may also be misused to hide incriminating files. Our work has already helped law enforcement in the state of Connecticut to reconstruct 66 incriminating images and 18 videos in a single criminal case. We present case studies and results from analyzing 18 Android vault applications (accounting for nearly 220 million downloads from the Google Play store) by reverse engineering them and examining the forensic artifacts they produce. Our results showed that 12/18 obfuscated their code and 5/18 applications used native libraries hindering the reverse engineering process of these applications. However, we still recovered data from the applications without root access to the Android device as we were able to ascertain hidden data on the device without rooting for 10/18 of the applications. 6/18 of the vault applications were found to not encrypt photos they stored, and 8/18 were found to not encrypt videos. 7/18 of the applications were found to store passwords in cleartext. We were able to also implement a swap attack on 5/18 applications where we achieved unauthorized access to the data by swapping the files that contained the password with a self-created one. In some cases, our findings illustrate unfavorable security implementations of privacy enhancing applications, but also showcase practical mechanisms for investigators to gain access to data of evidentiary value. In essence, we broke into the vaults.
机译:在这项工作中,我们共享了Android电子仓库应用程序的取证分析,安全性和隐私性的第一个帐户。保管箱旨在提高隐私性,因为它们允许用户隐藏个人数据,但也可能被滥用来隐藏罪案文件。我们的工作已经帮助康涅狄格州的执法机构在一个刑事案件中重建了66幅犯罪图像和18幅视频。通过对18个Android Vault应用程序进行逆向工程并检查它们产生的取证结果,我们分析了18个Android Vault应用程序(从Google Play商店下载了近2.2亿次下载),提供了案例研究和结果。我们的结果表明12/18混淆了他们的代码,而5/18应用程序使用本机库阻碍了这些应用程序的逆向工程过程。但是,我们仍然能够从应用程序中恢复数据,而无需root用户访问Android设备,因为我们能够确定设备上的隐藏数据而无需生根于10/18的应用程序。发现6/18的Vault应用程序不加密存储的照片,发现8/18不加密视频。发现7/18的应用程序以明文形式存储密码。我们还能够对5/18应用程序实施交换攻击,在该应用程序中,我们通过将包含密码的文件交换为自己创建的文件,从而实现了对数据的未授权访问。在某些情况下,我们的发现说明了隐私增强应用程序在安全方面的不利实施,但同时也展示了调查人员获得证据价值数据的实用机制。本质上,我们闯入了保险库。

著录项

  • 来源
    《Computers & Security》 |2017年第9期|516-531|共16页
  • 作者单位

    Cyber Forensics Research & Education Group, Tagliatela College of Engineering, ECECS, University of New Haven, 300 Boston Post Rd., West Haven, CT 06516, USA;

    Cyber Forensics Research & Education Group, Tagliatela College of Engineering, ECECS, University of New Haven, 300 Boston Post Rd., West Haven, CT 06516, USA;

    Cyber Forensics Research & Education Group, Tagliatela College of Engineering, ECECS, University of New Haven, 300 Boston Post Rd., West Haven, CT 06516, USA;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Forensics; Mobile applications; Privacy; Security; Vault applications; Android;

    机译:法证;移动应用;隐私;安全;保险柜应用程序;安卓系统;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号