Abstract | ||
---|---|---|
In this paper, we investigate and evaluate through experimental analysis the possibility of recovering authentication credentials of mobile applications from the volatile memory of Android mobile devices. Throughout the carried experiments and analysis, we have, exclusively, used open-source and free forensic tools. Overall, the contribution of this paper is threefold. First, it thoroughly, examines thirteen (13) mobile applications, which represent four common application categories that elaborate sensitive users' data, whether it is possible to recover authentication credentials from the physical memory of mobile devices, following thirty (30) different scenarios. Second, it explores in the considered applications, if we can discover patterns and expressions that indicate the exact position of authentication credentials in a memory dump. Third, it reveals a set of critical observations regarding the privacy of Android mobile applications and devices. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1016/j.cose.2014.01.004 | Computers & Security |
Keywords | Field | DocType |
Privacy of mobile applications,Mobile forensics,Android,Memory dump,Mobile applications,Volatile memory,Authentication credentials | Mobile computing,Internet privacy,Mobile search,Android (operating system),Computer security,Computer science,Mobile device forensics,Mobile device,Mobile Web,Volatile memory,Core dump | Journal |
Volume | ISSN | Citations |
42 | 0167-4048 | 10 |
PageRank | References | Authors |
0.70 | 7 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Christoforos Ntantogian | 1 | 86 | 13.03 |
Dimitris Apostolopoulos | 2 | 22 | 1.76 |
Giannis Marinakis | 3 | 21 | 1.39 |
Christos Xenakis | 4 | 221 | 28.00 |