| Literature DB >> 26393812 |
Quang Do1, Ben Martini1, Kim-Kwang Raymond Choo1.
Abstract
In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and rapidly changing nature of mobile device technologies. An integral principle and significant constraint upon forensic practitioners is that of forensic soundness. Our adversary model specifically considers and integrates the constraints of forensic soundness on the adversary, in our case, a forensic practitioner. One construction of the adversary model is an evidence collection and analysis methodology for Android devices. Using the methodology with six popular cloud apps, we were successful in extracting various information of forensic interest in both the external and internal storage of the mobile device.Entities:
Mesh:
Year: 2015 PMID: 26393812 PMCID: PMC4579090 DOI: 10.1371/journal.pone.0138449
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
A comparison of adversary models.
| Adversary Capabilities Fully Defined? | Adversary Goals | Adversary Assumptions | Adversary Model Limitations | |
|---|---|---|---|---|
| Dolev and Yao [ | Yes | The adversary seeks to obtain the plaintext for encrypted messages on the network. | The adversary can read any message on the network, and can initiate a two-way connection with any other user. | Very powerful, making it difficult to model weaker adversaries. |
| Bellare and Rogaway [ | Yes | Similarly to the Dolev-Yao model, the adversary aims to obtain the long-term secret key and/or the ephemeral / session key. | The adversary has similar capabilities to the Dolev-Yao model, including the ability to delay or replay messages. | Very powerful, but also flexible due to the notion of “queries” (i.e. adversary capabilities). |
| Syverson, et al. [ | No | The aim of the adversary is to determine the identity of (i.e. de-anonymize) the traffic flowing through its compromised nodes. | The adversary is assumed to have control of one or more nodes (known as Core Onion Routers). | Adversary capabilities are not formally defined. Furthermore, this model is specific to onion routing (e.g. compromised nodes), and cannot be generalizable. |
| Heiber and Marron [ | Yes | The adversary’s goal is to collect personal or private data (e.g. location information) from a network. | The adversary is designed such that it is only able to view data (i.e. it cannot modify it). | A weak adversary that is formally defined using inference rules. |
| Wu, et al. [ | No | The adversary aims to steal money from the user, gather sensitive information or destroy data on the device. | The adversary cannot initially request any “sensitive” permissions. | The adversary is defined very loosely. This means it cannot be used for formal proofs. |
| Zhou, et al. [ | No | The adversary aims to accurately determine the locations and behaviors of the user. | The adversary cannot request | This adversary is also very loosely defined. |
| Bugiel, Heuser and Sadeghi [ | No | The adversary’s goals are to obtain sensitive data and compromise apps on the device (both system and third-party) | The adversary is assumed to be “strong”. | This adversary lacks meaningful detail. |
Fig 1Android evidence collection and analysis methodology (adapted from [5]).
A mapping of methodology stages to adversary capabilities, constraints and adherence to forensic soundness constraints.
| Methodology Stage [ | Adversary Capabilities Utilized | Key Forensic Soundness Constraints | Adherence to Forensic Soundness Constraints |
|---|---|---|---|
| Setup Bootloader for Live OS |
|
| Implementation dependent for |
| Boot Live OS in Memory |
|
| Adheres to all applicable forensic soundness constraints |
| Collect Physical Image of Device Partitions |
| N/A | N/A |
| Examine App Files in Private Storage |
|
|
|
| Examine App Files on External Storage |
|
|
|
| Examine App Databases |
|
|
|
| Examine and Analyze Accounts Data |
|
| Adheres to all applicable forensic soundness constraints |
| Analyze App |
|
|
|
A comparison of Android data collection methodologies.
| Requirements or Outcomes | Our Adversary Model Derived Methodology [ | Votipka, Vidas and Christin [ | Vidas, Zhang and Christin [ | Son, et al. [ | Lessard and Kessler [ | Chen, Yang and Liu [ |
|---|---|---|---|---|---|---|
| Require device to be rooted? |
| No | No | No | Yes | No |
| Recovery/boot partition flashed |
| Yes, recovery partition | Yes, recovery partition | Yes, boot partition | No | Yes, recovery partition |
| Collects bit-for-bit physical copy? |
| Yes | Yes | No | No | No |
| Collects secure credential storage? |
| No | No | No | No | No |
| External SD Card required? |
| No | No | No | Yes | Yes |
| Analyzes collected data? |
| No | No | No | Yes | No |