首页> 外文OA文献 >Tools and Processes for Forensic Analyses of Smartphones and Mobile Malware
【2h】

Tools and Processes for Forensic Analyses of Smartphones and Mobile Malware

机译:智能手机和移动恶意软件取证分析的工具和过程

摘要

Malware is defined as computer programs that are used by an attacker to execute maliciouscode on the computer of a victim. In today's Internet malware constitutes a major problem andeffective safety measures against this harassment are necessary. This problem looms as a new andfuture threat to smartphones, too. They contain many information which are of great interest forattackers. Several hundred different versions of malware for this type of device have already beennoticed and it is expected that this number will increase even further within next years. Thus,effective and efficient protection measures against malware on mobile devices (mobile malware)become necessary, in order to have procedures for detecting and repelling these threats right fromthe beginning. Moreover, todays there is almost no criminal action in which information technologydoes not play a role. Increasingly, mobile devices become an object of investigation in the contextof crime detection. Due to this reason two major research aspects have been defined within thescope of a BMBF project named 'MobWorm':Automated Malware Analyses: In the scope of this question a prototype will be further developed.Therefore it is investigated which information from a mobile sandbox need to be collected.Afterwards, the corresponding implementation is executed. Moreover, methods are investigated,in how far the mobile sandbox may be used as a security measure, e.g. as a reference monitorfor downloaded applications. Here, the mobile sandbox monitors activities of a program and terminatesit directly if an unauthorized sequence of action occurs (e.g. the opening of a permittednetwork connection or the dialing of an expensive service number).Mobile Phone Forensics: Within the frame of this research question we develop severalmethods to conduct forensic analysis on smart phones. In this context a major focus is put onGoogles Android platform. In a first step various methods are researched how to create a memorydump of a mobile phone (e.g. with the help of Twister-Box, via JTAG or with specific software).These are documented in forensic processes, i.e. in detailed and exact activity rules. In a second stepthe methods for analyzing memory dumps are developed. As a result the usability and effectivenessof standard procedures like file carving and hash-value databases in the area of mobile phonesshould be investigated. The focus of the application examples is always put to the correspondinginvestigation of malware-infections. The methods and tools developed within the scope of thisresearch question are intended to be an addition to already existing propriety systems and theirfunctions which are often not well documented. With respect to the development we put greatemphasis on the compliance with forensic principles and we gear to scientific standards in this areaof research. The developed prototype as well as the fundamental research is important in orderto understand the behavior of mobile devices and software in a detailed way in terms of malwareanalysis.10
机译:恶意软件定义为攻击者用来在受害者计算机上执行恶意代码的计算机程序。在当今的Internet中,恶意软件已成为一个主要问题,因此必须有针对这种骚扰的有效安全措施。这个问题也即将成为对智能手机的新威胁。它们包含许多攻击者非常感兴趣的信息。已经注意到用于这种类型设备的数百种不同版本的恶意软件,并且预计该数字在未来几年内还会进一步增加。因此,为了从一开始就具有用于检测和消除这些威胁的过程,就必须有针对移动设备上的恶意软件(移动恶意软件)的有效保护措施。而且,今天几乎没有犯罪行为在其中信息技术不起作用。在犯罪检测的背景下,移动设备越来越成为调查的对象。由于这个原因,在一个名为'MobWorm'的BMBF项目的范围内定义了两个主要的研究方面:自动化恶意软件分析:在这个问题的范围内,将进一步开发一个原型,因此研究了移动沙箱需要哪些信息待收集,然后执行相应的实现。此外,还研究了将移动沙箱用作安全措施的程度的方法,例如:作为下载应用程序的参考监视器。在这里,移动沙箱监视程序的活动,如果发生未经授权的操作序列(例如,打开允许的网络连接或拨打昂贵的服务号码),则直接终止程序。手机取证:在此研究问题的范围内,我们开发几种方法在智能手机上进行取证分析。在这种情况下,重点放在Google的Android平台上。第一步,研究了各种方法来创建移动电话的内存转储(例如在Twister-Box的帮助下,通过JTAG或使用特定软件),这些都记录在取证过程中,即详细而精确的活动规则中。第二步,开发了用于分析内存转储的方法。因此,应该研究标准程序(如文件雕刻和哈希值数据库)在手机领域的可用性和有效性。应用示例的重点始终放在恶意软件感染的相应调查上。在此研究问题范围内开发的方法和工具旨在作为对现有礼仪系统及其功能的补充,而这些系统和功能通常没有得到很好的记录。关于发展,我们非常重视遵守法证原则,并在这一研究领域朝科学标准迈进。为了从恶意软件分析的角度详细了解移动设备和软件的行为,开发的原型以及基础研究非常重要。10

著录项

  • 作者

    Spreitzenbarth Michael;

  • 作者单位
  • 年度 2011
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号