Skip to main content

Forensic Analysis of Third-Party Cloud Software Development Kits for Android Apps

  • Conference paper
  • First Online:
Advances in Digital Forensics XX (DigitalForensics 2024)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 724))

Included in the following conference series:

  • 85 Accesses

Abstract

Android software development kits for cloud storage are commonly adopted by the app development community and countless apps from productivity tools to media-sharing platforms currently incorporate the kits. The popularity can be attributed to their ability to offer scalable and reliable cloud storage apps, reducing the need for on-device storage and ensuring data accessibility across devices. However, because the apps tend to store user information in the cloud, there are concerns about security risks and sensitive information leakage.

This chapter presents the results of a forensic analysis of 11 major Android cloud software development kits and 120 real-world apps that leverage the kits for data storage. The analysis revealed that 103 apps store user account information, including name, email, date of birth and profile picture, 77 apps access and store user media files and user preferences and settings in the cloud, and 12 apps track the last used times of other installed apps. Android software development kits for cloud storage are of great value in mobile device forensics because they support the extraction of diverse and novel types of evidence, including via uniform resource locators.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. 42matters, Top 20 backend and cloud SDKs used in Android apps on Google Play, Zurich, Switzerland (42matters.com/sdk-analysis/top-backend-and-cloud-sdks), 2024.

    Google Scholar 

  2. C. Anglano, Forensic analysis of WhatsApp Messenger on Android smartphones, Digital Investigation, vol. 11(3), pp. 201–213, 2014.

    Google Scholar 

  3. AppBrain, AirPush: A push-notification mobile ad network, AppTornado, Zurich, Switzerland (www.appbrain.com/stats/libraries/details/airpush/airpush), 2024.

  4. AppBrain, Welcome to AppBrain, AppTornado, Zurich, Switzerland (www.appbrain.com), 2024.

  5. S. Arzt, S. Rasthofer and E. Bodden, SuSi: A Tool for the Fully-Automated Classification of Android Sources and Sinks, Technical Report TUD-CS-2013-0114, Department of Computer Science, Technical University Darmstadt, Darmstadt, Germany, 2013.

    Google Scholar 

  6. S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau and P. McDaniel, FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps, ACM SIGPLAN Notices, vol. 49(6), pp. 259–269, 2014.

    Google Scholar 

  7. M. Backes, S. Bugiel, E. Derr, S. Gerling and C. Hammer, R-Droid: Leveraging Android app analysis with static slice optimization, Proceedings of the Eleventh ACM Asia Conference on Computer and Communications Security, pp. 129–140, 2016.

    Google Scholar 

  8. S. Calzavara, I. Grishchenko and M. Maffei, HornDroid: Practical and sound static analysis of Android applications by SMT solving, Proceedings of the IEEE European Symposium on Security and Privacy, pp. 47–62, 2016.

    Google Scholar 

  9. C. Cheng, C. Shi, N. Gong and Y. Guan, EviHunter: Identifying digital evidence in the permanent storage of Android devices via static analysis, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1338–1350, 2018.

    Google Scholar 

  10. W. Enck, P. Gilbert, S. Han, V. Tendulkar, B. Chun, L. Cox, J. Jung, P. McDaniel and A. Sheth, TaintDroid: An information-flow tracking system for realtime privacy monitoring of smartphones, ACM Transactions on Computer Systems, vol. 32(3), article no. 5, 2014.

    Google Scholar 

  11. W. Enck, D. Octeau, P. McDaniel and S. Chaudhuri, A study of Android application security, Proceedings of the Twentieth USENIX Security Symposium, 2011.

    Google Scholar 

  12. A. Feal, J. Gamba, N. Vallina-Rodriguez, P. Wijesekera, J. Reardon, S. Egelman and J. Tapiador, Don’t accept candy from strangers: An analysis of third-party mobile SDKs, Proceedings of the Computers, Privacy and Data Protection Conference, pp. 1–27, 2021.

    Google Scholar 

  13. C. Gibler, J. Crussell, J. Erickson and H. Chen, AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale, Proceedings of the Fifth International Conference on Trust and Trustworthy Computing, pp. 291–307, 2012.

    Google Scholar 

  14. Google Developers, UI/Application Exerciser Monkey, Mountain View, California (developer.android.com/studio/test/other-testing-tools/monkey), 2022.

    Google Scholar 

  15. M. Gordon, D. Kim, J. Perkins, L. Gilham, N. Nguyen and M. Rinard, Information flow analysis of Android applications in DroidSafe, Proceedings of the Twenty-Second Annual Network and Distributed System Security Symposium, 2015.

    Google Scholar 

  16. International Data Corporation, Smartphone market insights, Needham, Massachusetts (www.idc.com/prodserv/smartphone-os-market-share.jsp), January 16, 2024.

  17. K. Kalleberg, Frida: Putting the open back into closed software, presented at the Open Source Developers Conference, 2015.

    Google Scholar 

  18. J. Kim, Y. Yoon, K. Yi and J. Shin, ScanDal: Static analyzer for detecting privacy leaks in Android applications, poster presented at the Workshop on Mobile Security Technologies, 2012.

    Google Scholar 

  19. L. Li, A. Bartel, T. Bissyande, J. Klein, Y. Le Traon, S. Arzt, S. Rasthofer, E. Bodden, D. Octeau and P. McDaniel, IccTA: Detecting inter-component privacy leaks in Android apps, Proceedings of the Thirty-Seventh IEEE/ACM International Conference on Software Engineering, pp. 280–291, 2015.

    Google Scholar 

  20. M. Li, W. Wang, P. Wang, S. Wang, D. Wu, J. Liu, R. Xue and W. Huo, LibD: Scalable and precise third-party library detection in Android markets, Proceedings of the Thirty-Ninth IEEE/ACM International Conference on Software Engineering, pp. 335–346, 2017.

    Google Scholar 

  21. X. Lin, T. Chen, T. Zhu, K. Yang and F. Wei, Automated forensic analysis of mobile applications on Android devices, Digital Investigation, vol. 26(S), pp. S59–S66, 2018.

    Google Scholar 

  22. L. Lu, Z. Li, Z. Wu, W. Lee and G. Jiang, CHEX: Statically vetting Android apps for component hijacking vulnerabilities, Proceedings of the ACM Conference on Computer and Communications Security, pp. 229–240, 2012.

    Google Scholar 

  23. Z. Ma, H. Wang, Y. Guo and X. Chen, LibRadar: Fast and accurate detection of third-party libraries in Android apps, Proceedings of the Thirty-Eighth IEEE/ACM International Conference on Software Engineering, pp. 653–656, 2016.

    Google Scholar 

  24. C. Shi, C. Cheng and Y. Guan, LibDroid: Summarizing information flow of Android native libraries via static analysis, Forensic Science International: Digital Investigation, vol. 42(S), article no. 301405, 2022.

    Google Scholar 

  25. R. Stevens, C. Gibler, J. Crussell, J. Erickson and H. Chen, Investigating user privacy in Android ad libraries, Proceedings of the Workshop on Mobile Security Technologies, pp. 195–197, 2012.

    Google Scholar 

  26. M. Sun, T. Wei and J. Lui, TaintART: A practical multi-level information flow tracking system for Android RunTime, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 331–342, 2016.

    Google Scholar 

  27. F. Wei, S. Roy, X. Ou and Robby, Amandroid: A precise and general inter-component data flow analysis framework for security vetting of Android apps, ACM Transactions on Privacy and Security, vol. 21(3), article no. 14, 2018.

    Google Scholar 

  28. L. Xue, Y. Zhou, T. Chen, X. Luo and G. Gu, Malton: Towards on-device non-invasive mobile malware analysis for ART, Proceedings of the Twenty-Sixth USENIX Security Symposium, pp. 289–306, 2017.

    Google Scholar 

  29. Z. Yang and M. Yang, LeakMiner: Detecting information leakage on Android with static taint analysis, Proceedings of the Third World Congress on Software Engineering, pp. 101–104, 2012.

    Google Scholar 

  30. Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning and X. Wang, AppIntent: Analyzing sensitive data transmission in Android for privacy leakage detection, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1043–1054, 2013.

    Google Scholar 

  31. J. Zhang, A. Beresford and S. Kollmann, LibID: Reliable identification of obfuscated third-party Android libraries, Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 55–65, 2019.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Guan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shi, C., Guan, Y. (2025). Forensic Analysis of Third-Party Cloud Software Development Kits for Android Apps. In: Kurkowski, E., Shenoi, S. (eds) Advances in Digital Forensics XX. DigitalForensics 2024. IFIP Advances in Information and Communication Technology, vol 724. Springer, Cham. https://doi.org/10.1007/978-3-031-71025-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-71025-4_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-71024-7

  • Online ISBN: 978-3-031-71025-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics