By Alessandro Disfano, Gianluigi Me, Francesco Pace 11/08/2013 Fri. Daun Jeong.

Slides:



Advertisements
Similar presentations
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
Advertisements

MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 8: Troubleshooting Storage Devices and Display Devices.
File Management Systems
Guide to Computer Forensics and Investigations Fourth Edition
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Guide to Computer Forensics and Investigations Third Edition
1 File Management in Representative Operating Systems.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Chapter 7: Configuring Disks. 2/24 Objectives Learn about disk and file system configuration in Vista Learn how to manage storage Learn about the additional.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
Chapter 12 File Management Systems
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 3: Upgrading from a Previous Version of Windows.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
EPOCH 1000 File Management Data Logging and Reporting
1 Chapter Overview Managing Compression Managing Disk Quotas Increasing Security with EFS Using Disk Defragmenter, Check Disk, and Disk Cleanup.
Backup Concepts. Introduction Backup and recovery procedures protect your database against data loss and reconstruct the data, should loss occur. The.
SP2 Mikael Nystrom. Agenda Översikt Installation.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
COEN 252 Computer Forensics
Linux Networking and Security Chapter 10 File Security.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
1 Objectives Discuss the Windows Printer Model and how it is implemented in Windows Server 2008 Install the Print Services components of Windows Server.
File System. NET+OS 6 File System Architecture Design Goals File System Layer Design Storage Services Layer Design RAM Services Layer Design Flash Services.
Presentation By Deepak Katta
Data Deletion and Recovery. Data Deletion  What does data deletion mean in your own words?
Your Interactive Guide to the Digital World Discovering Computers 2012.
IT GOVERNANCE AND CYBERCRIME Open Source Forensic Tools 19/04/10.
Hands-On Microsoft Windows Server 2008
Implementing Database Snapshot & Database Mirroring in SQL Server 2005 Presented by Tarek Ghazali IT Technical Specialist Microsoft SQL Server MVP Microsoft.
Damien Leake. Definition To examine digital media to identify and analyze information so that it can be used as evidence in court cases Involves many.
CS5103 Software Engineering Lecture 08 Android Development II.
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 12 Windows 2000 Server.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Chapter Fourteen Windows XP Professional Fault Tolerance.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Presented by: New Features Ability for two users to be logged on simultaneously User Interface has a different look Media Player for Windows XP Messenger.
File System Management File system management encompasses the provision of a way to store your data in a computer, as well as a way for you to find and.
Managing Disks and Drives Chapter 13 powered by dj.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
File Management Chapter 12. File Management File management system is considered part of the operating system Input to applications is by means of a file.
Windows Vista Inside Out Chapter 28 - Chapter 28 - Managing Disks and Drives Last modified
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Linux+ Guide to Linux Certification, Third Edition
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Understanding Backup and Recovery Methods Lesson 8.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Module 4: Managing Access to Resources. Overview Overview of Managing Access to Resources Managing Access to Shared Folders Managing Access to Files and.
2007/5/ Digital Forensic Research Workshop (DFRWS) New Orleans, LA 1 Data Hiding in Journaling File Systems Knut Eckstein, Marko Jahnke 報告人:陳晉煒.
Your Interactive Guide to the Digital World Discovering Computers 2012.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
AccessData User Summit 2016 April 5 th – 7 th, 2016 Lake Mary, FL The Pros and Cons of JTAG and Chip Off Extractions.
How to Recover Deleted Photos from Android Cell Phone? Android is keeping on improving their products and make sure to provide the best software service.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Booting Process Chapter 4: System Software Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Photo recovery from water damaged XD memory card recovery-from-water-damaged-xd-memory-card.
How to Recover Deleted Files from Android Phone Internal Memory and External SD Card
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Full Review of Jihosoft Android Data Recovery
Recover Deleted Contacts from Android Mobiles and SIM Cards Android is becoming more and more popular for its openness. The open feature allows any mobile.
10. Mobile Device Forensics Part 2. Topics Collecting and Handling Cell Phones as Evidence Cell Phone Forensic Tools GPS (Global Positioning System)
Discovering Computers 2012: Chapter 8
Module 4: Managing Access to Resources
Print Out Text Messages from Android Phone Mac/Win
Introduction to Operating Systems
Windows XP File Systems
By Anwar Campbell.
Presentation transcript:

By Alessandro Disfano, Gianluigi Me, Francesco Pace 11/08/2013 Fri. Daun Jeong

 Introduction  Definition of Anti-forensics  The Android Operating System  Android Anti-forensics  Experiments  Conclusion

 Anti-forensics techniques applied to mobiles devices  Test for effectiveness of such techniques vs. both the cursory examination of the device and some acquisition tools  Trend  Uptick in the use of Anti-forensics  Confined in the classic forensics environment ⇒ The instance of some common AF techniques to Android mobile devices

 Any attempts to compromise the availability or usefulness of evidence in the forensic process.  The availability of evidence can be compromised by preventing its creation, hiding its existence and by manipulating the evidence.  The usefulness can be compromised by deleting the evidence or by tampering its integrity.

1. Destroying Evidence : Destruction of evidence in order to make it unusable. 2. Hiding Evidence : Decreasing the visibility of the evidence ⇒ Both 1 and 2 processes can make other evidence 3. Eliminating Evidence Sources : Preventing Evidence Creation 4. Counterfeiting Evidence : Creating a fake version of evidence.

 Supported by YAFFS2 File System.  YAFFS: Yet Another Flash File System  YAFFS1: designed for old NAND chips with 512 byte pages plus 16 byte spare areas.  YAFFS2: evolved from YAFFS1 to accommodate newer chips with 2048 byte pages plus 64 bytes spare areas.

 Application & Sandboxes : Android binds any running application to a secure Sandbox which cannot interfere with any other application.  User IDs and Permissions : Android manages each application as a different Linux user. Includes tags in application’s Android manifest.xml.

1. Current Android Forensics Techniques & Tools 2. Instantiating Anti-forensics 3. The Evidence Export Process 4. The Evidence Import Process 5. The Evidence Destruction Process

1. Android Debug Bridge (ADB) A tool provided with Android SDK which allows the interaction between the mobile device and a remote station. 2. Nandroid Backup Nandroid is a set of tools supporting the backup and restore capabilities for rooted Android devices. Support the full NAND flash memory imaging which can be performed by a special boot mode.

3. Physical Imaging by dd The dd tool allows the byte-level physical imaging of Unix files and can be applied to regular files and to devices files as well because of the availability of a Unix-like command shell. 4. Commercial Tools Commercial Tools: Parabon corporation, Micro Systemation, Celle brite. Open Source Tools: Mobile Internal Acquisition Tool.

5. Serial Commands over USB Capabilities to eavesdrop the data conveyed over- the-wire. 6. Simulated SD card To use a modified update file in order to avoid the destruction of internal memory data and to provide kernel-level tools to support the acquisition of data.

7. Softeware Application Applications that are able to explore, read, and mirror the contents stored by the File System even for the internal memory storage volume.

 Exploiting android features  Strong Linux process & User management policies  A private folder : A directory that is inaccessible for any other applications  Private folders in internal memory are hard to examine because of isolation and physical imaging  Anti-forensics by a common application : Evidence Export/Import/Destruction Process

1) Android Destroying Evidence : Text messages, The browser bookmark, Call log ⇒ Deletion of Related Database 2) Android Hiding Evidence : Multimedia files ⇒ Move them into internal storage (private folder) 3) Android Eliminating Evidence Sources : Multimedia Messages (MMSs) ⇒ Modify identifiers to be invisible to end-user 4) Android Counterfeiting Evidence : Contact Information ⇒ Modify flag & related number

 Restore the previous state of the device.  The private storage of the evidence  Organize the exported evidence using set of common files in the private folder  A XML-style file(export.xml) is responsible for the storage of all evidence  A number of files of various format are imported by the removable memory card.

 How to reconstruct the evidence?  Fully Automated Evidence Reconstruction: AFDroid 1) Private folder inspection 2) export.xml file processing ▪ Related DB & table ▪ The connection DB 3) Other file processing

 Internal Memory & Data Recovery  It is still incomplete to acquire the image of internal memory. (JTAG)  Fully Automated Process ⇒ Uninstall of AFDroid  All the related data are logically deleted by the FS.  Can avoid human errors.  Reduces time.

 Objectives : To test the strength of the Evidence Export/ Destruction process in relation to the tools that are currently able to acquire a snapshot of the internal memory of the target device.  Used devices : Samsung Galaxy i7500 device equipped with the Android 1.5 S 아.  Used acquisition tools : Paraben Device Seizure/Nandroid/MIAT

 Experimental Workflows 1) Evidence export process ▪ First imaging with Nandroid tool ▪ Execution of AFDroid ▪ Acquisition with MIAT tool ▪ Second imaging with Nandroid tool 2) Evidence destruction process ▪ First imaging with Nandroid tool ▪ Execution of AFDroid ▪ Second imaging with Nandroid tool ▪ Uninstall of the AFDroid ▪ Acquisition with the MIAT tool ▪ Third imaging with the Nandroid tool

Cursory examination of the SMS/MMS database before and after the EEP. The entire se of SMS/MMS message is emptied.

The Nandroid tool and MIAT tool can recover all the evidence that has been previously exported in the private folder

A large amount of the multimedia data can negatively affect the duration of the process. It is realistic to suppose that just reduced amount of such data can be exported into the private folder because of the limited capacity of the current internal memory.

 When the application is uninstalled and the EDP completed, private folder is removed including all the stored contents.  After that, neither the Nandroid nor the MIAT tools were able to recover the deleted data.

 Current and Future Work 1. Improving the AFDroid application ▪ To selectively choose the target evidence ▪ The expansion of the kinds of target evidence 2. Expanding the compatibility to other operating system ▪ Windows Moble, Symbian.

Android Anti-Forensics Through a Local Paradigm. Alessandro Distefano, Gianluigi Me and Francesco Pace, Digital Investigation 7 (2010) s83-s94.