首页> 外文期刊>Digital investigation >Automated forensic analysis of mobile applications on Android devices
【24h】

Automated forensic analysis of mobile applications on Android devices

机译:对Android设备上的移动应用程序进行自动取证分析

获取原文
获取原文并翻译 | 示例
       

摘要

It is not uncommon that mobile phones are involved in criminal activities, e.g., the surreptitious collection of credit card information. Forensic analysis of mobile applications plays a crucial part in order to gather evidences against criminals. However, traditional forensic approaches, which are based on manual investigation, are not scalable to the large number of mobile applications. On the other hand, dynamic analysis is hard to automate due to the burden of setting up the proper runtime environment to accommodate OS differences and dependent libraries and activate all feasible program paths. We propose a fully automated tool, Fordroid for the forensic analysis of mobile applications on Android. Fordroid conducts inter-component static analysis on Android APKs and builds control flow and data dependency graphs. Furthermore, Fordroid identifies what and where information written in local storage with taint analysis. Data is located by traversing the graphs. This addresses several technique challenges, which include inter-component string propagation, string operations (e.g., append) and API invocations. Also, Fordroid identifies how the information is stored by parsing SQL commands, i.e., the structure of database tables. Finally, we selected 100 random Android applications consisting of 2841 components from four categories for evaluation. Analysis of all apps took 64 h. Fordroid discovered 469 paths in 36 applications that wrote sensitive information (e.g., GPS) to local storage. Furthermore, Fordroid successfully located where the information was written for 458 (98%) paths and identified the structure of all (22) database tables. (C) 2018 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.
机译:手机参与犯罪活动(例如秘密收集信用卡信息)并不罕见。为了收集针对犯罪分子的证据,对移动应用程序进行取证分析至关重要。但是,基于手动调查的传统取证方法无法扩展到大量移动应用程序。另一方面,由于设置适当的运行时环境以适应OS差异和相关库以及激活所有可行程序路径的负担,动态分析很难自动化。我们提出了一种全自动工具Fordroid,用于对Android上的移动应用程序进行取证分析。 Fordroid在Android APK上进行组件间静态分析,并构建控制流和数据依赖图。此外,Fordroid通过污点分析识别在本地存储中写入的信息和位置。通过遍历图形来定位数据。这解决了一些技术挑战,包括组件间字符串传播,字符串操作(例如,append)和API调用。而且,Fordroid通过解析SQL命令(即数据库表的结构)来标识信息的存储方式。最后,我们从四个类别中选择了100个包含2841个组件的随机Android应用程序进行评估。所有应用程序的分析花费了64小时。 Fordroid在36个将敏感信息(例如GPS)写入本地存储的应用程序中发现了469条路径。此外,Fordroid成功地找到了用于458(98%)条路径的信息写入位置,并确定了所有(22)数据库表的结构。 (C)2018作者。由Elsevier Ltd代表DFRWS发布。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号