Please use this identifier to cite or link to this item:
https://www.um.edu.mt/library/oar/handle/123456789/99374
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bellizzi, Jennifer | - |
dc.contributor.author | Vella, Mark Joseph | - |
dc.contributor.author | Colombo, Christian | - |
dc.contributor.author | Hernandez-Castro, Julio | - |
dc.date.accessioned | 2022-07-15T07:31:58Z | - |
dc.date.available | 2022-07-15T07:31:58Z | - |
dc.date.issued | 2022 | - |
dc.identifier.citation | Bellizzi, J., Vella, M., Colombo, C., & Hernandez-Castro, J. (2022). Responding to targeted stealthy attacks on android using timely-captured memory dumps. IEEE Access, 10, 35172-35218. | en_GB |
dc.identifier.uri | https://www.um.edu.mt/library/oar/handle/123456789/99374 | - |
dc.description.abstract | The increasing dominance of Android smartphones for everyday communication and data processing makes long-term stealthy malware an even more dangerous threat. Recent malware campaigns like Flubot demonstrate that by employing stealthy malware techniques even at minimal capacity, malware is highly effective in making its way to millions of devices with little resistance from existing detection mechanisms. Consequential late detection demands comprehensive forensic timelines to reconstruct all malicious activities. However, the reduced forensic footprint of stealthy attacks with minimal malware involvement leaves investigators little evidence to work with even when utilising state-of-the-art digital forensics tools. Volatile memory forensics can be effective in such scenarios since app execution of any form is always bound to leave a trail of evidence in memory, even if it is short-lived. In this work, we motivate the need for JIT-MF (Just-in-time Memory Forensics), a technique that aims to address the challenges that arise with timely collection of short-lived evidence in volatile memory to solve the stealthiest of Android attacks. By taking an incident-response-centric approach, focused on protecting stock Android device users rather than treating them as potential adversaries, we show that JIT-MF tools can collect elusive attack steps in volatile memory without requiring device rooting. Furthermore, we build MobFor, a JIT-MF based tool focusing on capturing evidence related to messaging hijack attacks. This tool provides a context to explore solutions for JIT-MF implementation challenges, aiming to render JIT-MF tools practical for real-world requirements. Finally, we demonstrate that when compared to state-of-the-art digital forensic tools Belkasoft and XRY in a realistic attack scenario involving an enhanced version of the WhatsApp Pink malware and stock Android devices, only MobFor can recover the contents of messages sent by the malware, hence decisively contributing to an enriched forensic timeline. | en_GB |
dc.language.iso | en | en_GB |
dc.publisher | IEEE | en_GB |
dc.rights | info:eu-repo/semantics/openAccess | en_GB |
dc.subject | Computer crimes | en_GB |
dc.subject | Digital forensic science | en_GB |
dc.subject | Software engineering | en_GB |
dc.subject | Mobile computing | en_GB |
dc.subject | Smartphones | en_GB |
dc.title | Responding to targeted stealthy attacks on android using timely-captured memory dumps | en_GB |
dc.type | article | en_GB |
dc.rights.holder | The copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder. | en_GB |
dc.description.reviewed | peer-reviewed | en_GB |
dc.identifier.doi | 10.1109/ACCESS.2022.3160531 | - |
dc.publication.title | IEEE Access | en_GB |
Appears in Collections: | Scholarly Works - FacICTCS |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Responding_to_targeted_stealthy_attacks_on_android_using_timely-captured_memory_dumps(2022).pdf | 7.45 MB | Adobe PDF | View/Open |
Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.