Acquisition and analysis of volatile memory from Android devices

From Botnets.fr
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

(Publication) Google search: [1]

Acquisition and analysis of volatile memory from Android devices
Botnet
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 2012-02
Editor/Conference Elsevier
Link http://digitalforensicssolutions.com/papers/android-memory-analysis-DI.pdf (Archive copy)
DOI: 10.1016/j.diin.2011.10.003
Author Joe Sylve, Andrew Case, Lodovico Marziale, Golden G. Richard
Type

Abstract

The Android operating system for mobile phones, which is still relatively new, is rapidly gaining market share, with dozens of smartphones and tablets either released or set to be released. In this paper, we present the first methodology and toolset for acquisition and deep analysis of volatile physical memory from Android devices. The paper discusses some of the challenges in performing Android memory acquisition, discusses our new kernel module for dumping memory, named dmd, and specifically addresses the difficulties in developing device-independent acquisition tools. Our acquisition tool supports dumping memory to either the SD on the phone or via the network. We also present analysis of kernel structures using newly developed Volatility functionality. The results of this work illustrate the potential that deep memory analysis offers to digital forensics investigators.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR873,
   editor = {Elsevier},
   author = {Joe Sylve, Andrew Case, Lodovico Marziale, Golden G. Richard},
   title = {Acquisition and analysis of volatile memory from Android devices},
   date = {01},
   month = Feb,
   year = {2012},
doi = {10.1016/j.diin.2011.10.003}, howpublished = {\url{http://digitalforensicssolutions.com/papers/android-memory-analysis-DI.pdf}}, }