SlideShare a Scribd company logo
1 of 2
Download to read offline
Remote Live Forensics for Android Devices
Jonathan Ming
Department of Engineering and Computer Science
Azusa Pacific University
Azusa, CA, USA
jming13@apu.edu
Mengjun Xie
Department of Computer Science
University of Arkansas at Little Rock
Little Rock, AR, USA
mxxie@ualr.edu
Abstract—This research focuses on developing a new forensic
mechanism to integrate Android devices into existing remote live
forensic frameworks. Our mechanism allows incident responders
and forensic data analysts to collect detailed usage data from a
fleet of mobile devices in a way currently only available on
computers. A prototype system named DroidGRR was developed
to integrate Android devices into the GRR Rapid Response
forensic framework. Analysis of our prototype shows that usage
data can be successfully collected from a remote Android device
through the GRR framework. Our findings indicate that the
proposed solution is attainable and can provide new and rich
data to incident responders, corporate IT administrators, and
forensic analysts regarding the usage of mobile devices.
Index Terms—mobile security, Android, incident response,
mobile forensics, data collection, monitoring
I. INTRODUCTION
Mobile devices, as they become more powerful, are
becoming increasingly prevalent, especially in the U.S. [1]. A
2014 survey shows that roughly 80% of U.S. employees have
a smartphone with Internet access, and 49% have a tablet [2].
As mobile devices gain prevalence, they also have access to
more sensitive data than ever before. However, the security
measures for protecting those data have not yet adapted to
match such a wide adoption of mobile devices. This research
aims to push forward these security measures, focusing on the
scalable remote live data collection and incident response
mechanism for mobile devices.
II. BACKGROUND
If a smartphone or tablet becomes compromised, incident
responders and forensic analysts currently have quite limited
options to examine the compromised device remotely. During
this research, nine existing mobile device forensic tools [3, 6-
14] were examined. We found that only one of them, FireEye
Mobile Threat Prevention, provided the ability to remotely
collect forensic data from a mobile device without rooting or
jailbreaking [3]. The others either required physical access to
the device or required insecure modifications to the mobile
device’s operating system. An ideal mobile forensic solution
does not suffer from these problems.
The solution sought by this research aims to achieve the
following features: 1) requiring no physical access to the
device, 2) requiring no rooting of the device, and 3) being able
to access live, relevant data while the phone’s internal storage
is encrypted. In addition, this solution should leverage and be
integrated into existing forensic frameworks, in order to be
scalable and easily adopted, and be able to provide aggregate
analytics across both mobile and non-mobile devices.
III. RELATED WORK
Two existing forensics projects are particularly relevant to
this research. One is GRR Rapid Response [4] and the other is
DroidWatch [5]. Some characteristics of these two projects are
highlighted as follows.
1) GRR Rapid Response
 “An incident response framework focused on remote
live forensics”
 Initially developed at Google, was open-sourced
 Requires one central Linux server; supports numerous
Windows, Mac OS X, and Linux clients
 Largest known open-source deployment has
approximately 30,000 clients installed
2) DroidWatch
 A prototype monitoring app designed to collect data
from Android devices
 Initially developed by Justin Grover in 2013 as an
open source project, no further development since then
 Not integrable with existing forensic frameworks
IV. DESIGN
To facilitate integration, the prototype developed for this
research (named DroidGRR after the style of DroidWatch)
applies the model already employed by GRR Rapid Response.
This model follows a request-and-response format (see Fig. 1).
First, a framework administrator or data analyst accesses the
central server, which then sends requests to a selected client or
group of clients. After that, the clients collect the data from
their respective host machines and respond to the server with
the requested data in an asynchronous manner.
Fig. 1 Request-Response Design Model
In order to match this model, DroidGRR is required to
behave as a standard GRR client. In other words, it has to
listen for and respond to requests issued by the GRR server.
This design marks the primary difference between DroidGRR
2016 IEEE Conference on Communications and Network Security (CNS): IEEE CNS 2016 - Posters
978-1-5090-3065-1/16/$31.00 ©2016 IEEE
and DroidWatch. DroidWatch follows a simple monitoring
model designed by Grover, in which interested data are
collected continuously and sent to a server automatically [5].
While that approach is straightforward and easy to implement,
it is incompatible with GRR’s operational model. Therefore,
Grover’s design model was discarded for this research in order
to facilitate integration with GRR.
V. IMPLEMENTATION & EVALUATION
During this research, a prototype system of DroidGRR was
developed. The screenshot of the DroidGRR application is
shown in the left figure. Due to time constraint, the entirety of
the model was not implemented.
At the time of this writing,
DroidGRR has functioning
watchers, can communicate
with the GRR server, can enroll
with the server as an available
client, and can poll the server
for flow requests.
Because flow request
handling and response delivery
could not be implemented in the
available time, a complete
evaluation of the model side by
side with a standard GRR client
could not be performed.
However, the portion of the
implementation that was completed did shed light onto the
design model and serves well as a proof of concept.
DroidGRR, even in its current state, demonstrates the
feasibility of live, remote usage data collection from mobile
devices and the feasibility of integrating mobile devices into
existing live forensic frameworks without compromising the
device’s security (via rooting).
VI. CHALLENGES
The primary challenge of this research was fashioning the
solution to be integrable with existing forensic frameworks. In
order to be integrated with GRR Rapid Response, the
prototype has to behave and communicate with the server in
the same manner GRR’s existing PC clients behave and
communicate, which was difficult to implement in Android.
A secondary challenge of this research was dealing with
the inherent limitations of the Android operating system. In
particular, retrieving device logs was a problem in this area.
Logcat application activity logs can provide invaluable insight
into the inner workings of the device. However, as of Android
4.1 installed apps are denied permission to view Logcat. The
only way to circumvent this prohibition on log access is to root
the device, which is undesirable for this solution.
VII. CONCLUSION
DroidGRR’s success at collecting data from an Android
device and enrolling with a GRR server clearly indicates that
mobile device integration into existing forensic frameworks is
attainable. Even though DroidGRR’s full implementation has
not been completed, the developed prototype and functions are
sufficient to validate the design described in Section IV. This
design will serve as a model for our further development of
scalable incident response tools for mobile devices. It can also
serve as a model for including mobile devices into existing
forensic frameworks.
Moreover, after implementing DroidGRR and being more
familiar with GRR Rapid Response framework and Android
operating system, it became clear to us that continuing to use
and extend the request-response model will not only work, but
also enable entirely new categories of data to be added to the
GRR framework (e.g., records of dubious MMS messages
containing malicious code). These new categories of data
would augment GRR’s incident response capabilities by
enabling responders to evaluate mobile devices as well as
traditional computers when considering attack vectors.
ACKNOWLEDGMENT
This work was supported by the Research Experiences for
Undergraduates (REU) Program of the National Science
Foundation under Award Number 1359323.
REFERENCES
[1] M. Anderson, “Technology Device Ownership: 2015,” Pew
Research Center, October 2015.
[2] J. Harter, S. Agrawal, and S. Sorenson, “Most U.S. Workers
See Upside to Staying Connected to Work,” Gallup, Inc., April
2014. http://www.gallup.com/poll/168794/workers-upside-
staying-connected-work.aspx
[3] FireEye, Inc., “FireEye Mobile Threat Prevention Data Sheet.”
https://www.fireeye.com/content/dam/fireeye-
www/global/en/products/pdfs/fireeye-mobile-threat-
prevention.pdf
[4] “GRR Project FAQ,” GRR Rapid Response Documentation
https://github.com/google/grr-doc/blob/master/faq.adoc
[5] J. Grover, “Android forensics: Automated data collection and
reporting from a mobile device,” Digital Investigation, vol. 10
Supplement, pp. S12-S20, August 2013.
[6] Katana Forensics, “LANTERN Device Acquisition and
Analysis.” https://katanaforensics.com/products/lantern/
[7] Guidance Software, “Encase Forensic Product Overview,” p. 4.
[8] M. Shannon, “F-Response and Android,” F-Response.
https://www.f-response.com/blog/f-response-and-android
[9] AccessData, “Mobile Phone Examiner Plus.”
http://accessdata.com/solutions/digital-forensics/mpe
[10] NowSecure, “NowSecure Forensics.”
https://www.nowsecure.com/forensics/
[11] Open Source Android Forensics, “OSAF Community Site.”
http://osaf-community.org/home.html
[12] Evidence Talks, “SPEKTOR Forensic Intelligence.”
http://www.remoteforensics.com/index.php/products/spektor
[13] Lisa Phifer, “How mobile device encryption works to protect
sensitive data,” TechTarget, March 2013.
[14] Heather Mahalik, “Open Source Mobile Device Forensics,”
http://www.nist.gov/forensics/upload/6-Mahalik_OSMF.pd
2016 IEEE Conference on Communications and Network Security (CNS): IEEE CNS 2016 - Posters

More Related Content

Similar to CNS_2016_Poster_Ming.pdf

Mitigating Privilege-Escalation Attacks on Android Report
Mitigating Privilege-Escalation Attacks on Android  ReportMitigating Privilege-Escalation Attacks on Android  Report
Mitigating Privilege-Escalation Attacks on Android ReportVinoth Kanna
 
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESBEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESijaia
 
A Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files SystemA Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files SystemCSCJournals
 
IRJET- Root Security Firewall
IRJET- Root Security FirewallIRJET- Root Security Firewall
IRJET- Root Security FirewallIRJET Journal
 
IRJET- Root Security Firewall
IRJET-  	  Root Security FirewallIRJET-  	  Root Security Firewall
IRJET- Root Security FirewallIRJET Journal
 
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...IJNSA Journal
 
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONSANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONSIJNSA Journal
 
Androinspector a system for
Androinspector a system forAndroinspector a system for
Androinspector a system forIJNSA Journal
 
Facial Recognition and Detection Technical Review
Facial Recognition and Detection Technical ReviewFacial Recognition and Detection Technical Review
Facial Recognition and Detection Technical ReviewTkeyah Anderson
 
1668170.ppt
1668170.ppt1668170.ppt
1668170.ppt230405
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniquesijwmn
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESijwmn
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureeSAT Publishing House
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET Journal
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various ToolsIRJET Journal
 
Android Malware Detection
Android Malware DetectionAndroid Malware Detection
Android Malware DetectionIRJET Journal
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...IOSR Journals
 
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...theijes
 
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...csandit
 
Android Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorAndroid Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorIRJET Journal
 

Similar to CNS_2016_Poster_Ming.pdf (20)

Mitigating Privilege-Escalation Attacks on Android Report
Mitigating Privilege-Escalation Attacks on Android  ReportMitigating Privilege-Escalation Attacks on Android  Report
Mitigating Privilege-Escalation Attacks on Android Report
 
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESBEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
 
A Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files SystemA Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files System
 
IRJET- Root Security Firewall
IRJET- Root Security FirewallIRJET- Root Security Firewall
IRJET- Root Security Firewall
 
IRJET- Root Security Firewall
IRJET-  	  Root Security FirewallIRJET-  	  Root Security Firewall
IRJET- Root Security Firewall
 
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
 
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONSANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
 
Androinspector a system for
Androinspector a system forAndroinspector a system for
Androinspector a system for
 
Facial Recognition and Detection Technical Review
Facial Recognition and Detection Technical ReviewFacial Recognition and Detection Technical Review
Facial Recognition and Detection Technical Review
 
1668170.ppt
1668170.ppt1668170.ppt
1668170.ppt
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
 
Android Malware Detection
Android Malware DetectionAndroid Malware Detection
Android Malware Detection
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
 
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
 
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
 
Android Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorAndroid Application For Decentralized Family Locator
Android Application For Decentralized Family Locator
 

Recently uploaded

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...sonatiwari757
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 

Recently uploaded (20)

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 

CNS_2016_Poster_Ming.pdf

  • 1. Remote Live Forensics for Android Devices Jonathan Ming Department of Engineering and Computer Science Azusa Pacific University Azusa, CA, USA jming13@apu.edu Mengjun Xie Department of Computer Science University of Arkansas at Little Rock Little Rock, AR, USA mxxie@ualr.edu Abstract—This research focuses on developing a new forensic mechanism to integrate Android devices into existing remote live forensic frameworks. Our mechanism allows incident responders and forensic data analysts to collect detailed usage data from a fleet of mobile devices in a way currently only available on computers. A prototype system named DroidGRR was developed to integrate Android devices into the GRR Rapid Response forensic framework. Analysis of our prototype shows that usage data can be successfully collected from a remote Android device through the GRR framework. Our findings indicate that the proposed solution is attainable and can provide new and rich data to incident responders, corporate IT administrators, and forensic analysts regarding the usage of mobile devices. Index Terms—mobile security, Android, incident response, mobile forensics, data collection, monitoring I. INTRODUCTION Mobile devices, as they become more powerful, are becoming increasingly prevalent, especially in the U.S. [1]. A 2014 survey shows that roughly 80% of U.S. employees have a smartphone with Internet access, and 49% have a tablet [2]. As mobile devices gain prevalence, they also have access to more sensitive data than ever before. However, the security measures for protecting those data have not yet adapted to match such a wide adoption of mobile devices. This research aims to push forward these security measures, focusing on the scalable remote live data collection and incident response mechanism for mobile devices. II. BACKGROUND If a smartphone or tablet becomes compromised, incident responders and forensic analysts currently have quite limited options to examine the compromised device remotely. During this research, nine existing mobile device forensic tools [3, 6- 14] were examined. We found that only one of them, FireEye Mobile Threat Prevention, provided the ability to remotely collect forensic data from a mobile device without rooting or jailbreaking [3]. The others either required physical access to the device or required insecure modifications to the mobile device’s operating system. An ideal mobile forensic solution does not suffer from these problems. The solution sought by this research aims to achieve the following features: 1) requiring no physical access to the device, 2) requiring no rooting of the device, and 3) being able to access live, relevant data while the phone’s internal storage is encrypted. In addition, this solution should leverage and be integrated into existing forensic frameworks, in order to be scalable and easily adopted, and be able to provide aggregate analytics across both mobile and non-mobile devices. III. RELATED WORK Two existing forensics projects are particularly relevant to this research. One is GRR Rapid Response [4] and the other is DroidWatch [5]. Some characteristics of these two projects are highlighted as follows. 1) GRR Rapid Response  “An incident response framework focused on remote live forensics”  Initially developed at Google, was open-sourced  Requires one central Linux server; supports numerous Windows, Mac OS X, and Linux clients  Largest known open-source deployment has approximately 30,000 clients installed 2) DroidWatch  A prototype monitoring app designed to collect data from Android devices  Initially developed by Justin Grover in 2013 as an open source project, no further development since then  Not integrable with existing forensic frameworks IV. DESIGN To facilitate integration, the prototype developed for this research (named DroidGRR after the style of DroidWatch) applies the model already employed by GRR Rapid Response. This model follows a request-and-response format (see Fig. 1). First, a framework administrator or data analyst accesses the central server, which then sends requests to a selected client or group of clients. After that, the clients collect the data from their respective host machines and respond to the server with the requested data in an asynchronous manner. Fig. 1 Request-Response Design Model In order to match this model, DroidGRR is required to behave as a standard GRR client. In other words, it has to listen for and respond to requests issued by the GRR server. This design marks the primary difference between DroidGRR 2016 IEEE Conference on Communications and Network Security (CNS): IEEE CNS 2016 - Posters 978-1-5090-3065-1/16/$31.00 ©2016 IEEE
  • 2. and DroidWatch. DroidWatch follows a simple monitoring model designed by Grover, in which interested data are collected continuously and sent to a server automatically [5]. While that approach is straightforward and easy to implement, it is incompatible with GRR’s operational model. Therefore, Grover’s design model was discarded for this research in order to facilitate integration with GRR. V. IMPLEMENTATION & EVALUATION During this research, a prototype system of DroidGRR was developed. The screenshot of the DroidGRR application is shown in the left figure. Due to time constraint, the entirety of the model was not implemented. At the time of this writing, DroidGRR has functioning watchers, can communicate with the GRR server, can enroll with the server as an available client, and can poll the server for flow requests. Because flow request handling and response delivery could not be implemented in the available time, a complete evaluation of the model side by side with a standard GRR client could not be performed. However, the portion of the implementation that was completed did shed light onto the design model and serves well as a proof of concept. DroidGRR, even in its current state, demonstrates the feasibility of live, remote usage data collection from mobile devices and the feasibility of integrating mobile devices into existing live forensic frameworks without compromising the device’s security (via rooting). VI. CHALLENGES The primary challenge of this research was fashioning the solution to be integrable with existing forensic frameworks. In order to be integrated with GRR Rapid Response, the prototype has to behave and communicate with the server in the same manner GRR’s existing PC clients behave and communicate, which was difficult to implement in Android. A secondary challenge of this research was dealing with the inherent limitations of the Android operating system. In particular, retrieving device logs was a problem in this area. Logcat application activity logs can provide invaluable insight into the inner workings of the device. However, as of Android 4.1 installed apps are denied permission to view Logcat. The only way to circumvent this prohibition on log access is to root the device, which is undesirable for this solution. VII. CONCLUSION DroidGRR’s success at collecting data from an Android device and enrolling with a GRR server clearly indicates that mobile device integration into existing forensic frameworks is attainable. Even though DroidGRR’s full implementation has not been completed, the developed prototype and functions are sufficient to validate the design described in Section IV. This design will serve as a model for our further development of scalable incident response tools for mobile devices. It can also serve as a model for including mobile devices into existing forensic frameworks. Moreover, after implementing DroidGRR and being more familiar with GRR Rapid Response framework and Android operating system, it became clear to us that continuing to use and extend the request-response model will not only work, but also enable entirely new categories of data to be added to the GRR framework (e.g., records of dubious MMS messages containing malicious code). These new categories of data would augment GRR’s incident response capabilities by enabling responders to evaluate mobile devices as well as traditional computers when considering attack vectors. ACKNOWLEDGMENT This work was supported by the Research Experiences for Undergraduates (REU) Program of the National Science Foundation under Award Number 1359323. REFERENCES [1] M. Anderson, “Technology Device Ownership: 2015,” Pew Research Center, October 2015. [2] J. Harter, S. Agrawal, and S. Sorenson, “Most U.S. Workers See Upside to Staying Connected to Work,” Gallup, Inc., April 2014. http://www.gallup.com/poll/168794/workers-upside- staying-connected-work.aspx [3] FireEye, Inc., “FireEye Mobile Threat Prevention Data Sheet.” https://www.fireeye.com/content/dam/fireeye- www/global/en/products/pdfs/fireeye-mobile-threat- prevention.pdf [4] “GRR Project FAQ,” GRR Rapid Response Documentation https://github.com/google/grr-doc/blob/master/faq.adoc [5] J. Grover, “Android forensics: Automated data collection and reporting from a mobile device,” Digital Investigation, vol. 10 Supplement, pp. S12-S20, August 2013. [6] Katana Forensics, “LANTERN Device Acquisition and Analysis.” https://katanaforensics.com/products/lantern/ [7] Guidance Software, “Encase Forensic Product Overview,” p. 4. [8] M. Shannon, “F-Response and Android,” F-Response. https://www.f-response.com/blog/f-response-and-android [9] AccessData, “Mobile Phone Examiner Plus.” http://accessdata.com/solutions/digital-forensics/mpe [10] NowSecure, “NowSecure Forensics.” https://www.nowsecure.com/forensics/ [11] Open Source Android Forensics, “OSAF Community Site.” http://osaf-community.org/home.html [12] Evidence Talks, “SPEKTOR Forensic Intelligence.” http://www.remoteforensics.com/index.php/products/spektor [13] Lisa Phifer, “How mobile device encryption works to protect sensitive data,” TechTarget, March 2013. [14] Heather Mahalik, “Open Source Mobile Device Forensics,” http://www.nist.gov/forensics/upload/6-Mahalik_OSMF.pd 2016 IEEE Conference on Communications and Network Security (CNS): IEEE CNS 2016 - Posters