Evaluating the privacy of Android mobile applications under forensic analysis

C Ntantogian, D Apostolopoulos, G Marinakis… - Computers & …, 2014 - Elsevier
In this paper, we investigate and evaluate through experimental analysis the possibility of
recovering authentication credentials of mobile applications from the volatile memory of …

{DroidScraper}: A Tool for Android {In-Memory} Object Recovery and Reconstruction

A Ali-Gombe, S Sudhakaran, A Case… - … on Research in Attacks …, 2019 - usenix.org
There is a growing need for post-mortem analysis in forensics investigations involving
mobile devices, particularly when application-specific behaviors must be analyzed. This is …

Post-mortem memory analysis of cold-booted android devices

C Hilgers, H Macht, T Müller… - … Conference on IT …, 2014 - ieeexplore.ieee.org
As recently shown in 2013, Android-driven smartphones and tablet PCs are vulnerable to so-
called cold boot attacks. With physical access to an Android device, forensic memory dumps …

[HTML][HTML] Detecting objective-C malware through memory forensics

A Case, GG Richard III - Digital Investigation, 2016 - Elsevier
Major advances in memory forensics in the past decade now allow investigators to efficiently
detect and analyze many types of sophisticated kernel-level malware. With operating …

[PDF][PDF] Live memory forensics on android with volatility

H Macht - Friedrich-Alexander University Erlangen-Nuremberg, 2013 - homac.github.io
More and more people rely on smartphones to manage their personal data. For many, it has
become a constant companion for a variety of tasks, such as making calls, surfing the web …

Dump and analysis of android volatile memory on wechat

F Zhou, Y Yang, Z Ding, G Sun - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
With the popularity of smartphones, various types of mobile crimes emerge endlessly.
Evidence from mobile phones is mostly obtained by non-volatile physical memory dump and …

Procedures and tools for acquisition and analysis of volatile memory on Android smartphones

AP Heriyanto - 2013 - ro.ecu.edu.au
Mobile phone forensics have become more prominent since mobile phones have become
ubiquitous both for personal and business practice. Android smartphones show tremendous …

Picking up the trash: Exploiting generational GC for memory analysis

A Pridgen, S Garfinkel, DS Wallach - Digital Investigation, 2017 - Elsevier
Memory analysis is slowly moving up the software stack. Early analysis efforts focused on
core OS structures and services. As this field evolves, more information becomes accessible …

App-agnostic post-execution semantic analysis of Android in-memory forensics artifacts

A Ali-Gombe, A Tambaoan, A Gurfolino… - Proceedings of the 36th …, 2020 - dl.acm.org
Over the last decade, userland memory forensics techniques and algorithms have gained
popularity among practitioners, as they have proven to be useful in real forensics and …

Present but Unreachable: Reducing Persistentlatent Secrets in HotSpot JVM

A Pridgen, S Garfinkel, D Wallach - 2017 - aisel.aisnet.org
Applications that manage sensitive secrets, including cryptographic keys, are typically
engineered to overwrite the secrets in memory once they're no longer necessary, offering an …