I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.
Declaration
I [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.
Signed __________________ Date _________________
Abstract
In order to catch the smartest criminals in the world, digital forensics examiners need a means of collaborating and sharing information with each other and outside experts that is not prohibitively difficult. However, standard operating procedures and the rules of evidence generally disallow the use of the collaboration software and techniques that are currently available because they do not fully adhere to the dictated procedures for the handling, analysis, and disclosure of items relating to cases.
The aim of this work is to study the Android technology and analyse the forensics that have been designed and utilized for it. The research at hand elaborates upon the Android operating system, its architecture, the application and security framework, different Android versions, and their security. Moreover, a detailed description of the challenges related to the digital forensics has been mentioned along with the discussion on the Android vulnerabilities.
The entire research has been performed in the qualitative manner which undertakes to study the phenomenological concepts applied in the dissertation. Various libraries, databases and the published works have been studied in order to complete the research work in the current subject.
Table Of Contents
ACKNOWLEDGEMENT2
DECLARATION3
ABSTRACT4
CHAPTER 1: INTRODUCTION7
Background7
Problem Statement9
Research Aim9
Research Question9
Objective of the Research9
Layout of the Report10
Chapter 110
Chapter 210
Chapter 310
Chapter 411
Chapter 511
CHAPTER 2: LITERATURE REVIEW12
Mobile Ecosystem12
Android Technology12
Forensics14
Operating System15
Operating System Security16
Architecture of Android18
Linux Kernel19
Libraries20
Android Runtime20
Application Framework21
Security Framework23
Applications26
Android application sand-box model26
Android vs. Symbian OS vs. Windows Mobile27
Why compare Symbian OS to Android?28
Versions of Android28
Android 1.029
Android 1.530
Android 1.630
Android 2.0/2.130
Android 2.231
Android 2.331
Android 3.031
Android 4.032
Comparison between the 2.1 and 3.0 Versions32
Java Application33
Inter Process Communication34
Android Security34
?Botnets35
?Malicious applications36
?Spyware36
?Bluetooth37
?Wi-Fi37
?Phishing37
?Traditional security38
?Other security measures38
Defense of User Information40
Challenges Related to Digital Forensic41
Time Inefficiencies41
?Software Limitations41
?Size of Evidence Data42
?Increased Examiner Workload42
?Heterogeneity of Evidence Data43
?Application Domains43
CHAPTER 3: RESEARCH METHODOLOGY45
Research Philosophy & Design45
Research Approach46
Research Method46
Qualitative Research47
Ethics48
CHAPTER 4: ANALYSIS AND DISCUSSION49
Secure Handling of Mobile Content50
Solutions to the Digital Threats51
Security Tools for Android54
?Anti-Virus Tool55
?Firewall55
?Rootkit Detectors56
?Nodobo57
Android Security Policy Enforcement Mechanism59
Android-specific Vulnerabilities60
?Leaking Information to Logs60
?Leaking Information via IPC60
?Unprotected Broadcast Receivers61
?Intent Injection Attacks61
?Delegating Control61
?Null Checks on IPC Input62
?SDcard Use62
?JNI Use62
Cloud Computing Infrastructure for Securing Elastic Android Applications62
CHAPTER 5: CONCLUSION66
REFERENCES68
CHAPTER 1: INTRODUCTION
The internet combined with smart phones and its peripherals open the doors to limitless mobile possibilities. One of these possibilities is explored and exploited by capturing video on a mobile device, in real-time, and transferring to a web page, viewable by the entire world. Currently, streaming live video from a mobile phone is limited to commercial products such as Bambuser and Qik, while an open source solution has not yet surfaced. Open source lets developers and users view the source code free of charge and ...