Acquisition and analysis of volatile memory from Android devices

From Botnets.fr
Jump to navigation Jump to search

(Publication) Link to the old Wiki page : [1] / Google search: [2]

Acquisition and analysis of volatile memory from Android devices
Botnet
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 2012-02
Editor/Conference Elsevier
Link http://digitalforensicssolutions.com/papers/android-memory-analysis-DI.pdf (Archive copy)
DOI: 10.1016/j.diin.2011.10.003
Author Joe Sylve, Andrew Case, Lodovico Marziale, Golden G. Richard
Type

Abstract

The Android operating system for mobile phones, which is still relatively new, is rapidly gaining market share, with dozens of smartphones and tablets either released or set to be released. In this paper, we present the first methodology and toolset for acquisition and deep analysis of volatile physical memory from Android devices. The paper discusses some of the challenges in performing Android memory acquisition, discusses our new kernel module for dumping memory, named dmd, and specifically addresses the difficulties in developing device-independent acquisition tools. Our acquisition tool supports dumping memory to either the SD on the phone or via the network. We also present analysis of kernel structures using newly developed Volatility functionality. The results of this work illustrate the potential that deep memory analysis offers to digital forensics investigators.

Bibtex

 @misc{Sylve2012BFR873,
   editor = {Elsevier},
   author = {Joe Sylve, Andrew Case, Lodovico Marziale, Golden G. Richard},
   title = {Acquisition and analysis of volatile memory from Android devices},
   date = {01},
   month = Feb,
   year = {2012},
doi = {10.1016/j.diin.2011.10.003}, howpublished = {\url{http://digitalforensicssolutions.com/papers/android-memory-analysis-DI.pdf}}, }