EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis

08/18/2018
by   Chris Chao-Chun Cheng, et al.
0

Crimes, both physical and cyber, increasingly involve smartphones due to their ubiquity. Therefore, digital evidence on smartphones plays an increasingly important role in crime investigations. Digital evidence could reside in the memory and permanent storage of a smartphone. While we have witnessed significant progresses on memory forensics recently, identifying evidence in the permanent storage is still an underdeveloped research area. Most existing studies on permanent-storage forensics rely on manual analysis or keyword-based scanning of the permanent storage. Manual analysis is costly, while keyword matching often misses the evidentiary data that do not have interesting keywords. In this work, we develop a tool called EviHunter to automatically identify evidentiary data in the permanent storage of an Android device. There could be thousands of files on the permanent storage of a smartphone. A basic question a forensic investigator often faces is which files could store evidentiary data. EviHunter aims to answer this question. Our intuition is that the evidentiary data were produced by apps; and an app's code has rich information about the types of data the app may write to a permanent storage and the files the data are written to. Therefore, EviHunter first pre-computes an App Evidence Database (AED) via static analysis of a large number of apps. The AED includes the types of evidentiary data and files that store them for each app. Then, EviHunter matches the files on a smartphone's permanent storage against the AED to identify the files that could store evidentiary data. We evaluate EviHunter on benchmark apps and 8,690 real-world apps. Our results show that EviHunter can precisely identify both the types of evidentiary data and the files that store them.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/08/2020

Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps

Third-party security apps are an integral part of the Android app ecosys...
research
12/16/2019

AppStreamer: Reducing Storage Requirements of Mobile Games through Predictive Streaming

Storage has become a constrained resource on smartphones. Gaming is a po...
research
06/09/2021

Grand Theft App: Digital Forensics of Vehicle Assistant Apps

Due to the increasing connectivity of modern vehicles, collected data is...
research
08/17/2023

Watch Out! Smartwatches as criminal tool and digital forensic investigations

In the rapidly advancing technological landscape, smartwatches have mate...
research
06/16/2023

Acoustic Identification of Ae. aegypti Mosquitoes using Smartphone Apps and Residual Convolutional Neural Networks

In this paper, we advocate in favor of smartphone apps as low-cost, easy...
research
05/12/2021

Responding to Living-Off-the-Land Tactics using Just-in-Time Memory Forensics (JIT-MF) for Android

Digital investigations of stealthy attacks on Android devices pose parti...
research
04/19/2019

StegoAppDB: a Steganography Apps Forensics Image Database

In this paper, we present a new reference dataset simulating digital evi...

Please sign up or login with your details

Forgot password? Click here to reset