Discovering Authentication Credentials in Volatile Memory of Android Mobile Devices

Conference object English OPEN
Apostolopoulos , Dimitris; Marinakis , Giannis; Ntantogian , Christoforos; Xenakis , Christos;
(2013)
  • Publisher: Springer
  • Related identifiers: doi: 10.1007/978-3-642-37437-1_15
  • Subject: [ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI] | Android applications | [ INFO ] Computer Science [cs] | Android | credentials discovery | volatile memory acquisition | mobile security

Part 5: Adoption Issues in e/m-Services; International audience; This paper investigates whether authentication credentials in the volatile memory of Android mobile devices can be discovered using freely available tools. The experiments that we carried out for each appl... View more
  • References (9)

    1. http://www.foxnews.com/tech/2012/03/12/symantecs-lost-cell-phone-study-confirmsworst-in-people/. [Retrieved on Nov. 2012]

    2. https://www.google.com/nexus/4/#play. [Retrieved on Nov. 2012]

    3. http://www.csid.com/news/csid-conducts-study-of-consumer-password-habits-findsdisconnect-in-practices-and-mindset/, “Study of Consumer Password Habits”, September 2012, [Retrieved on Nov. 2012]

    4. http://www.idc.com/getdoc.jsp?containerId=prUS23771812. [Retrieved on Nov. 2012]

    5. Bornstein, D., “Dalvik VM Internals”, Google I/O Developer Conference, Jun. 2008

    6. http://mobworld.wordpress.com/2010/07/05/memory-management-in-Android/. [Retrieved on Nov. 2012]

    7. Hoog, A., “Android Forensics: Investigation, Analysis, and Mobile Security for Google Android”, Syngress, Elsevier, Jun. 2011.

    8. Girault, E., “Volatilitux: Physical memory analysis of Linux systems”, Dec. 2010

    9. http://code.google.com/p/lime-forensics/. [Retrieved on Nov. 2012]

  • Related Research Results (1)
  • Metrics
    No metrics available
Share - Bookmark