Forensic Analysis On Android Mobiles

Read Complete Research Material



Forensic analysis on Android Mobiles

By

Acknowledgement

I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.

Declaration

I [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.

Signed __________________ Date _________________

Abstract

In order to catch the smartest criminals in the world, digital forensics examiners need a means of collaborating and sharing information with each other and outside experts that is not prohibitively difficult. However, standard operating procedures and the rules of evidence generally disallow the use of the collaboration software and techniques that are currently available because they do not fully adhere to the dictated procedures for the handling, analysis, and disclosure of items relating to cases.

The aim of this work is to study the Android technology and analyse the forensics that have been designed and utilized for it. The research at hand elaborates upon the Android operating system, its architecture, the application and security framework, different Android versions, and their security. Moreover, a detailed description of the challenges related to the digital forensics has been mentioned along with the discussion on the Android vulnerabilities.

The entire research has been performed in the qualitative manner which undertakes to study the phenomenological concepts applied in the dissertation. Various libraries, databases and the published works have been studied in order to complete the research work in the current subject.

Table Of Contents

ACKNOWLEDGEMENT2

DECLARATION3

ABSTRACT4

CHAPTER 1: INTRODUCTION7

Background7

Problem Statement9

Research Aim9

Research Question9

Objective of the Research9

Layout of the Report10

Chapter 110

Chapter 210

Chapter 310

Chapter 411

Chapter 511

CHAPTER 2: LITERATURE REVIEW12

Mobile Ecosystem12

Android Technology12

Forensics14

Operating System15

Operating System Security16

Architecture of Android18

Linux Kernel19

Libraries20

Android Runtime20

Application Framework21

Security Framework23

Applications26

Android application sand-box model26

Android vs. Symbian OS vs. Windows Mobile27

Why compare Symbian OS to Android?28

Versions of Android28

Android 1.029

Android 1.530

Android 1.630

Android 2.0/2.130

Android 2.231

Android 2.331

Android 3.031

Android 4.032

Comparison between the 2.1 and 3.0 Versions32

Java Application33

Inter Process Communication34

Android Security34

?Botnets35

?Malicious applications36

?Spyware36

?Bluetooth37

?Wi-Fi37

?Phishing37

?Traditional security38

?Other security measures38

Defense of User Information40

Challenges Related to Digital Forensic41

Time Inefficiencies41

?Software Limitations41

?Size of Evidence Data42

?Increased Examiner Workload42

?Heterogeneity of Evidence Data43

?Application Domains43

CHAPTER 3: RESEARCH METHODOLOGY45

Research Philosophy & Design45

Research Approach46

Research Method46

Qualitative Research47

Ethics48

CHAPTER 4: ANALYSIS AND DISCUSSION49

Secure Handling of Mobile Content50

Solutions to the Digital Threats51

Security Tools for Android54

?Anti-Virus Tool55

?Firewall55

?Rootkit Detectors56

?Nodobo57

Android Security Policy Enforcement Mechanism59

Android-specific Vulnerabilities60

?Leaking Information to Logs60

?Leaking Information via IPC60

?Unprotected Broadcast Receivers61

?Intent Injection Attacks61

?Delegating Control61

?Null Checks on IPC Input62

?SDcard Use62

?JNI Use62

Cloud Computing Infrastructure for Securing Elastic Android Applications62

CHAPTER 5: CONCLUSION66

REFERENCES68

CHAPTER 1: INTRODUCTION

The internet combined with smart phones and its peripherals open the doors to limitless mobile possibilities. One of these possibilities is explored and exploited by capturing video on a mobile device, in real-time, and transferring to a web page, viewable by the entire world. Currently, streaming live video from a mobile phone is limited to commercial products such as Bambuser and Qik, while an open source solution has not yet surfaced. Open source lets developers and users view the source code free of charge and ...