Home Science DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging

DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging


The goal of cyber attack investigation is to fully reconstruct the details of an attack, so we can trace back to its origin, and recover the system from the damage caused by the attack. However, it is often difficult and requires tremendous manual efforts because attack events occurred days or even weeks before the investigation and detailed information we need is not available anymore. Consequently, forensic logging is significantly important for cyber attack investigation. In this paper, the authors present DroidForensics, a multi-layer forensic logging technique for Android. Their goal is to provide the user with detailed information about attack behaviors that can enable accurate post-mortem investigation of Android attacks. DroidForensics consists of three logging modules. API logger captures Android API calls that contain high-level semantics of an application. Binder logger records interactions between applications to identify causal relations between processes, and system call logger efficiently monitors low-level system events. They also provide the user interface that the user can compose SQL-like queries to inspect an attack. Their experiments show that Droid Forensics has low runtime overhead (2.9% on average) and low space overhead (105 ~ 169 MByte during 24 hours) on real Android devices. It is effective in the reconstruction of real world Android attacks they have studied.

  • How to Perform Hadoop Forensics

    In this post Chiheb Chebbi shows you how to perform Hadoop forensics. You will learn about…
  • Cloud Forensics: Box

    It seems we really enjoy forensicating desktop apps for cloud services. Last week we start…
  • The Magic of Raw Data Carving

    You have used all of the utilities in your expensive forensic suite, and other programs to…
Load More Related Articles
Load More In Science

Leave a Reply

Your email address will not be published. Required fields are marked *