Abstract
Android software development kits for cloud storage are commonly adopted by the app development community and countless apps from productivity tools to media-sharing platforms currently incorporate the kits. The popularity can be attributed to their ability to offer scalable and reliable cloud storage apps, reducing the need for on-device storage and ensuring data accessibility across devices. However, because the apps tend to store user information in the cloud, there are concerns about security risks and sensitive information leakage.
This chapter presents the results of a forensic analysis of 11 major Android cloud software development kits and 120 real-world apps that leverage the kits for data storage. The analysis revealed that 103 apps store user account information, including name, email, date of birth and profile picture, 77 apps access and store user media files and user preferences and settings in the cloud, and 12 apps track the last used times of other installed apps. Android software development kits for cloud storage are of great value in mobile device forensics because they support the extraction of diverse and novel types of evidence, including via uniform resource locators.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
42matters, Top 20 backend and cloud SDKs used in Android apps on Google Play, Zurich, Switzerland (42matters.com/sdk-analysis/top-backend-and-cloud-sdks), 2024.
C. Anglano, Forensic analysis of WhatsApp Messenger on Android smartphones, Digital Investigation, vol. 11(3), pp. 201–213, 2014.
AppBrain, AirPush: A push-notification mobile ad network, AppTornado, Zurich, Switzerland (www.appbrain.com/stats/libraries/details/airpush/airpush), 2024.
AppBrain, Welcome to AppBrain, AppTornado, Zurich, Switzerland (www.appbrain.com), 2024.
S. Arzt, S. Rasthofer and E. Bodden, SuSi: A Tool for the Fully-Automated Classification of Android Sources and Sinks, Technical Report TUD-CS-2013-0114, Department of Computer Science, Technical University Darmstadt, Darmstadt, Germany, 2013.
S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau and P. McDaniel, FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps, ACM SIGPLAN Notices, vol. 49(6), pp. 259–269, 2014.
M. Backes, S. Bugiel, E. Derr, S. Gerling and C. Hammer, R-Droid: Leveraging Android app analysis with static slice optimization, Proceedings of the Eleventh ACM Asia Conference on Computer and Communications Security, pp. 129–140, 2016.
S. Calzavara, I. Grishchenko and M. Maffei, HornDroid: Practical and sound static analysis of Android applications by SMT solving, Proceedings of the IEEE European Symposium on Security and Privacy, pp. 47–62, 2016.
C. Cheng, C. Shi, N. Gong and Y. Guan, EviHunter: Identifying digital evidence in the permanent storage of Android devices via static analysis, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1338–1350, 2018.
W. Enck, P. Gilbert, S. Han, V. Tendulkar, B. Chun, L. Cox, J. Jung, P. McDaniel and A. Sheth, TaintDroid: An information-flow tracking system for realtime privacy monitoring of smartphones, ACM Transactions on Computer Systems, vol. 32(3), article no. 5, 2014.
W. Enck, D. Octeau, P. McDaniel and S. Chaudhuri, A study of Android application security, Proceedings of the Twentieth USENIX Security Symposium, 2011.
A. Feal, J. Gamba, N. Vallina-Rodriguez, P. Wijesekera, J. Reardon, S. Egelman and J. Tapiador, Don’t accept candy from strangers: An analysis of third-party mobile SDKs, Proceedings of the Computers, Privacy and Data Protection Conference, pp. 1–27, 2021.
C. Gibler, J. Crussell, J. Erickson and H. Chen, AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale, Proceedings of the Fifth International Conference on Trust and Trustworthy Computing, pp. 291–307, 2012.
Google Developers, UI/Application Exerciser Monkey, Mountain View, California (developer.android.com/studio/test/other-testing-tools/monkey), 2022.
M. Gordon, D. Kim, J. Perkins, L. Gilham, N. Nguyen and M. Rinard, Information flow analysis of Android applications in DroidSafe, Proceedings of the Twenty-Second Annual Network and Distributed System Security Symposium, 2015.
International Data Corporation, Smartphone market insights, Needham, Massachusetts (www.idc.com/prodserv/smartphone-os-market-share.jsp), January 16, 2024.
K. Kalleberg, Frida: Putting the open back into closed software, presented at the Open Source Developers Conference, 2015.
J. Kim, Y. Yoon, K. Yi and J. Shin, ScanDal: Static analyzer for detecting privacy leaks in Android applications, poster presented at the Workshop on Mobile Security Technologies, 2012.
L. Li, A. Bartel, T. Bissyande, J. Klein, Y. Le Traon, S. Arzt, S. Rasthofer, E. Bodden, D. Octeau and P. McDaniel, IccTA: Detecting inter-component privacy leaks in Android apps, Proceedings of the Thirty-Seventh IEEE/ACM International Conference on Software Engineering, pp. 280–291, 2015.
M. Li, W. Wang, P. Wang, S. Wang, D. Wu, J. Liu, R. Xue and W. Huo, LibD: Scalable and precise third-party library detection in Android markets, Proceedings of the Thirty-Ninth IEEE/ACM International Conference on Software Engineering, pp. 335–346, 2017.
X. Lin, T. Chen, T. Zhu, K. Yang and F. Wei, Automated forensic analysis of mobile applications on Android devices, Digital Investigation, vol. 26(S), pp. S59–S66, 2018.
L. Lu, Z. Li, Z. Wu, W. Lee and G. Jiang, CHEX: Statically vetting Android apps for component hijacking vulnerabilities, Proceedings of the ACM Conference on Computer and Communications Security, pp. 229–240, 2012.
Z. Ma, H. Wang, Y. Guo and X. Chen, LibRadar: Fast and accurate detection of third-party libraries in Android apps, Proceedings of the Thirty-Eighth IEEE/ACM International Conference on Software Engineering, pp. 653–656, 2016.
C. Shi, C. Cheng and Y. Guan, LibDroid: Summarizing information flow of Android native libraries via static analysis, Forensic Science International: Digital Investigation, vol. 42(S), article no. 301405, 2022.
R. Stevens, C. Gibler, J. Crussell, J. Erickson and H. Chen, Investigating user privacy in Android ad libraries, Proceedings of the Workshop on Mobile Security Technologies, pp. 195–197, 2012.
M. Sun, T. Wei and J. Lui, TaintART: A practical multi-level information flow tracking system for Android RunTime, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 331–342, 2016.
F. Wei, S. Roy, X. Ou and Robby, Amandroid: A precise and general inter-component data flow analysis framework for security vetting of Android apps, ACM Transactions on Privacy and Security, vol. 21(3), article no. 14, 2018.
L. Xue, Y. Zhou, T. Chen, X. Luo and G. Gu, Malton: Towards on-device non-invasive mobile malware analysis for ART, Proceedings of the Twenty-Sixth USENIX Security Symposium, pp. 289–306, 2017.
Z. Yang and M. Yang, LeakMiner: Detecting information leakage on Android with static taint analysis, Proceedings of the Third World Congress on Software Engineering, pp. 101–104, 2012.
Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning and X. Wang, AppIntent: Analyzing sensitive data transmission in Android for privacy leakage detection, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1043–1054, 2013.
J. Zhang, A. Beresford and S. Kollmann, LibID: Reliable identification of obfuscated third-party Android libraries, Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 55–65, 2019.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 IFIP International Federation for Information Processing
About this paper
Cite this paper
Shi, C., Guan, Y. (2025). Forensic Analysis of Third-Party Cloud Software Development Kits for Android Apps. In: Kurkowski, E., Shenoi, S. (eds) Advances in Digital Forensics XX. DigitalForensics 2024. IFIP Advances in Information and Communication Technology, vol 724. Springer, Cham. https://doi.org/10.1007/978-3-031-71025-4_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-71025-4_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-71024-7
Online ISBN: 978-3-031-71025-4
eBook Packages: Computer ScienceComputer Science (R0)