skip to main content
10.1145/3243734.3243808acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis

Published: 15 October 2018 Publication History

Abstract

Crimes, both physical and cyber, increasingly involve smartphones due to their ubiquity. Therefore, digital evidence on smartphones plays an increasingly important role in crime investigations. Digital evidence could reside in the memory and permanent storage of a smartphone. While we have witnessed significant progresses on memory forensics recently, identifying evidence in the permanent storage is still an underdeveloped research area. Most existing studies on permanent-storage forensics rely on manual analysis or keyword-based scanning of the permanent storage. Manual analysis is costly, while keyword matching often misses the evidentiary data that do not have interesting keywords. In this work, we develop a tool called EviHunter to automatically identify evidentiary data in the permanent storage of an Android device. There could be thousands of files on the permanent storage of a smartphone. A basic question a forensic investigator often faces is which files could store evidentiary data. EviHunter aims to answer this question. Our intuition is that the evidentiary data were produced by apps; and an app's code has rich information about the types of data the app may write to a permanent storage and the files the data are written to. Therefore, EviHunter first pre-computes an App Evidence Database (AED) via static analysis of a large number of apps. The AED includes the types of evidentiary data and files that store them for each app. Then, EviHunter matches the files on a smartphone's permanent storage against the AED to identify the files that could store evidentiary data. We evaluate EviHunter on benchmark apps and 8,690 real-world apps. Our results show that EviHunter can precisely identify both the types of evidentiary data and the files that store them.

Supplementary Material

MP4 File (p1338-cheng.mp4)

References

[1]
Mohammed I Al-Saleh and Yahya A Forihat. 2013. Skype forensics in android devices. International Journal of Computer Applications, Vol. 78, 7 (2013).
[2]
Tadani Alyahya and Firdous Kausar. 2017. Snapchat Analysis to Discover Digital Forensic Artifacts on Android Smartphone. Procedia Computer Science, Vol. 109 (2017).
[3]
Cosimo Anglano. 2014. Forensic analysis of WhatsApp Messenger on Android smartphones. Digital Investigation, Vol. 11, 3 (2014).
[4]
Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. 2014. FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps. In PLDI.
[5]
Michael Backes, Sven Bugiel, Erik Derr, Sebastian Gerling, and Christian Hammer. 2016. R-Droid: Leveraging Android App Analysis with Static Slice Optimization. In AsiaCCS.
[6]
Evan Bush. 2017. Suspects' phones led Northwest investigators to carcasses in one of the biggest poaching cases they've ever seen. https://goo.gl/nUQyNA
[7]
Stefano Calzavara, Ilya Grishchenko, and Matteo Maffei. 2016. HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving. In EuroS&P.
[8]
Matthew Dering Somesh Jha Patrick McDaniel Damien Octeau, Daniel Luchaup. 2015. Composite Constant Propagation: Application to Android Inter-Component Communication Analysis. In ICSE.
[9]
F. Daryabar, M. H. Tadayon, A. Parsi, and H. Sadjadi. 2016. Automated analysis method for forensic investigation of cloud applications on Android. In IST.
[10]
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2010. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In OSDI.
[11]
Adam P Fuchs, Avik Chaudhuri, and Jeffrey S Foster. 2009. Scandroid: Automated security certification of android. Technical Report.
[12]
Clint Gibler, Jonathan Crussell, Jeremy Erickson, and Hao Chen. 2012. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale. In TRUST.
[13]
Michael I Gordon, Deokhwan Kim, Jeff H Perkins, Limei Gilham, Nguyen Nguyen, and Martin C Rinard. 2015. Information Flow Analysis of Android Applications in DroidSafe. In NDSS.
[14]
Justin Grover. 2013. Android forensics: Automated data collection and reporting from a mobile device. Digital Investigation, Vol. 10 (2013).
[15]
Hans Henseler. 2017. Finding digital evidence in mobile devices. In DFRWS.
[16]
Filip Karpisek, Ibrahim Baggili, and Frank Breitinger. 2015. WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages. Digital Investigation, Vol. 15 (2015).
[17]
Jinyung Kim, Yongho Yoon, Kwangkeun Yi, Junbum Shin, and SWRD Center. 2012. ScanDal: Static analyzer for detecting privacy leaks in android applications. MoST, Vol. 12 (2012).
[18]
Xinfang Lee, Chunghuang Yang, Shihjen Chen, and Jainshing Wu. 2009. Design and implementation of forensic system in Android smart phone. In The 5th Joint Workshop on Information Security.
[19]
Hannah Leone. 2017. GPS evidence can be used in Aurora KFC shooting case. https://goo.gl/28rGnN
[20]
Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick McDaniel. 2015. IccTA: Detecting Inter-component Privacy Leaks in Android Apps. In ICSE.
[21]
Mark Lohrum. 2014. Live imaging an Android device Not as hard as it sounds if you break it down. https://freeandroidforensics.blogspot.kr/2014/08/live-imaging-android-device.html
[22]
Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, and Guofei Jiang. 2012. CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities. In CCS.
[23]
Stefan Maus, Hans Höfken, and Marko Schuba. 2011. Forensic analysis of geodata in android smartphones. In International Conference on Cybercrime, Security and Digital Forensics.
[24]
DECLAN MCCULLAGH. 2010. Police Blotter: Web searches lead to murder conviction. https://goo.gl/HqJ6h4
[25]
J. E. R. McMillan, W. B. Glisson, and M. Bromby. 2013. Investigating the Increase in Mobile Phone Evidence in Criminal Activities. In HICSS.
[26]
Christopher Neasbitt, Bo Li, Roberto Perdisci, Long Lu, Kapil Singh, and Kang Li. 2015. WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers. In CCS.
[27]
Siegfried Rasthofer, Steven Arzt, and Eric Bodden. 2014. A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks. In NDSS.
[28]
Bradley Reaves, Jasmine Bowers, Sigmund Albert Gorski III, Olabode Anise, Rahul Bobhate, Raymond Cho, Hiranava Das, Sharique Hussain, Hamza Karachiwala, Nolen Scaife, Byron Wright, Kevin Butler, William Enck, and Patrick Traynor. 2016. ast Droid: Assessment and Evaluation of Android Application Analysis Tools. ACM Comput. Surv. (2016).
[29]
Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, and Dongyan Xu. 2015a. GUITAR: Piecing Together Android App GUIs from Memory Images. In CCS.
[30]
Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, and Dongyan Xu. 2015b. VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images. In CCS.
[31]
Brendan Saltaformaggio, Rohit Bhatia, Xiangyu Zhang, Dongyan Xu, and Golden G. Richard III. 2016. Screen After Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images. In Usenix Security Symposium.
[32]
Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, and Dongyan Xu. 2014. DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse. In Usenix Security Symposium.
[33]
Mingshen Sun, Tao Wei, and John C.S. Lui. 2016. TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime. In CCS.
[34]
United States v. Brendt A. Christensen. 2017. Criminal Complaint, United States District Court, Central District of Illinois. https://goo.gl/b81btj
[35]
Raja Vallée-Rai, Phong Co, Etienne Gagnon, Laurie Hendren, Patrick Lam, and Vijay Sundaresan. 1999. Soot - a Java Bytecode Optimization Framework. In CASCON.
[36]
Nicolas Viennot, Edward Garcia, and Jason Nieh. 2014. A Measurement Study of Google Play. In SIGMETRICS.
[37]
Fengguo Wei, Sankardas Roy, Xinming Ou, and Robby. 2014. Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps. In CCS.
[38]
Songyang Wu, Yong Zhang, Xupeng Wang, Xiong Xiong, and Lin Du. 2017. Forensic analysis of WeChat on Android smartphones. Digital Investigation, Vol. 21 (2017).
[39]
Zhen Xu, Chen Shi, Chris Chao-Chun Cheng, Neil Zhengqiang Gong, and Yong Guan. 2018. A Dynamic Taint Analysis Tool for Android App Forensics. In SADFE.
[40]
Lei Xue, Yajin Zhou, Ting Chen, Xiapu Luo, and Guofei Gu. 2017. Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART. In Usenix Security Symposium.
[41]
Z. Yang and M. Yang. 2012. LeakMiner: Detect Information Leakage on Android with Static Taint Analysis. In WCSE.

Cited By

View all
  • (2025)Forensic Analysis of Third-Party Cloud Software Development Kits for Android AppsAdvances in Digital Forensics XX10.1007/978-3-031-71025-4_3(43-62)Online publication date: 7-Jan-2025
  • (2023)Forensic Operations for Recognizing SQLite Content (FORC): An Automated Forensic Tool for Efficient SQLite Evidence Extraction on Android DevicesApplied Sciences10.3390/app13191073613:19(10736)Online publication date: 27-Sep-2023
  • (2023)Paradise: Real-Time, Generalized, and Distributed Provenance-Based Intrusion DetectionIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.316087920:2(1624-1640)Online publication date: 1-Mar-2023
  • Show More Cited By

Index Terms

  1. EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
    October 2018
    2359 pages
    ISBN:9781450356930
    DOI:10.1145/3243734
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 October 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. digital forensics
    2. mobile device forensics
    3. static analysis

    Qualifiers

    • Research-article

    Conference

    CCS '18
    Sponsor:

    Acceptance Rates

    CCS '18 Paper Acceptance Rate 134 of 809 submissions, 17%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)29
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Forensic Analysis of Third-Party Cloud Software Development Kits for Android AppsAdvances in Digital Forensics XX10.1007/978-3-031-71025-4_3(43-62)Online publication date: 7-Jan-2025
    • (2023)Forensic Operations for Recognizing SQLite Content (FORC): An Automated Forensic Tool for Efficient SQLite Evidence Extraction on Android DevicesApplied Sciences10.3390/app13191073613:19(10736)Online publication date: 27-Sep-2023
    • (2023)Paradise: Real-Time, Generalized, and Distributed Provenance-Based Intrusion DetectionIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.316087920:2(1624-1640)Online publication date: 1-Mar-2023
    • (2023)An Anti-Fuzzing Approach for Android AppsAdvances in Digital Forensics XIX10.1007/978-3-031-42991-0_3(37-53)Online publication date: 19-Oct-2023
    • (2023)Forensic Analysis of Android Cryptocurrency Wallet ApplicationsAdvances in Digital Forensics XIX10.1007/978-3-031-42991-0_2(21-36)Online publication date: 19-Oct-2023
    • (2022)A Two-Layered Machine Learning Approach for Anti-Malware Sustainability2022 9th International Conference on Computing for Sustainable Global Development (INDIACom)10.23919/INDIACom54597.2022.9763123(7-11)Online publication date: 23-Mar-2022
    • (2020)The dynamic update method of attribute-induced three-way granular concept in formal contextsInternational Journal of Approximate Reasoning10.1016/j.ijar.2019.12.014Online publication date: Jan-2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media