2014 47th Hawaii International Conference on System Sciences 2014
DOI: 10.1109/hicss.2014.593
|View full text |Cite
|
Sign up to set email alerts
|

Android Anti-forensics: Modifying CyanogenMod

Abstract: Mobile devices implementing Android operating systems inherently create opportunities to present environments that are conducive to anti-forensic activities. Previous mobile forensics research focused on applications and data hiding anti-forensics solutions. In this work, a set of modifications were developed and implemented on a CyanogenMod community distribution of the Android operating system. The execution of these solutions successfully prevented data extractions, blocked the installation of forensic tool… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 14 publications
0
11
0
Order By: Relevance
“…The authors used a 5 step methodology to execute experiment; investigate OS modifications, consult Android documents, modified the content providers, created and entered a data set into the phone and performed forensic extractions using Cellebrite and XRY. Used both USB debugging on and off through the use of Android Debugging Bridge [1]. File formats leave room for interpretations.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors used a 5 step methodology to execute experiment; investigate OS modifications, consult Android documents, modified the content providers, created and entered a data set into the phone and performed forensic extractions using Cellebrite and XRY. Used both USB debugging on and off through the use of Android Debugging Bridge [1]. File formats leave room for interpretations.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However they are various Anti-forensic techniques that are available that makes it difficult for an Investigator or Forensic Analyst to acquire reliable data. Some of the antiforensic techniques can be classified as Data Hiding (Encryption, Steganography), Artifact wiping, Trail obfuscation and Attacks against processes and tools [1]. This research proposes a solution to the anti-forensic technique of steganography by designing and developing an application that will detect the presence of stegno data within the android device and then perform logical data acquisition of images, videos and audio files.…”
mentioning
confidence: 99%
“…These techniques and tools are commonly referred to as anti-forensics and are primarily used to "compromise the availability or usefulness of evidence to the forensic process" [8]. Several recent research studies ( [4], [9], [10], [11], [12], [13]) have investigated the effect and feasible use of antiforensics in the smartphone environment. The first study [4] explored the possibility to create a false digital alibi on a smartphone and thwart investigations.…”
Section: Introductionmentioning
confidence: 99%
“…al., [24] and the suitability of such solutions to problems that have been highlighted in next generation aircraft architectures [19] and in antiforensic situations [13].…”
Section: Secure End-to-end Communicationmentioning
confidence: 99%