2015 10th International Conference on Availability, Reliability and Security (ARES) (2015)
Aug. 24, 2015 to Aug. 27, 2015
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/ARES.2015.47
Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to access arbitrary data in main memory is the cold boot attack. The cold boot attack exploits theremanence effect that causes data in DRAM modules not to lose the content immediately in case of a power cut-off. This makes it possible to restart a device and extract the data in main memory. In this paper, we present a novel framework for cold boot based data acquisition with a minimal bare metal application on a mobile device. In contrast to other cold boot approaches, our forensics tool overwrites only a minimal amount of data in main memory. This tool requires no more than five kilobytes of constant data in the kernel code section. We hence sustain all of the data relevant for the analysis of the previously running system. This makes it possible to analyze the memory with data acquisition tools. For this purpose, we extend the memory forensics tool Volatility in order to request parts of the main memory dynamically from our bare metal application. We show the feasibility of our approach by comparing it to a traditional memory dump based analysis using the Samsung Galaxy S4 mobile device.
Random access memory, Kernel, Forensics, Linux, Data acquisition, Smart phones
B. Taubmann, M. Huber, S. Wessel, L. Heim, H. P. Reiser and G. Sigl, "A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices," 2015 10th International Conference on Availability, Reliability and Security (ARES), Toulouse, France, 2015, pp. 120-128.