%0 Conference Proceedings %T A Tool for Volatile Memory Acquisition from Android Devices %+ Tsinghua University [Beijing] (THU) %A Yang, Haiyu %A Zhuge, Jianwei %A Liu, Huiming %A Liu, Wei %Z Part 8: FORENSIC TOOLS %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 12th IFIP International Conference on Digital Forensics (DF) %C New Delhi, India %Y Gilbert Peterson %Y Sujeet Shenoi %I Springer International Publishing %3 Advances in Digital Forensics XII %V AICT-484 %P 365-378 %8 2016-01-04 %D 2016 %R 10.1007/978-3-319-46279-0_19 %K Mobile device forensics %K Memory forensics %K Android %K Rootkit detection %Z Computer Science [cs]Conference papers %X Memory forensic tools provide a thorough way to detect malware and investigate cyber crimes. However, existing memory forensic tools must be compiled against the exact version of the kernel source code and the exact kernel configuration. This poses a problem for Android devices because there are more than 1,000 manufacturers and each manufacturer maintains its own kernel. Moreover, new security enhancements introduced in Android Lollipop prevent most memory acquisition tools from executing.This chapter describes AMExtractor, a tool for acquiring volatile physical memory from a wide range of Android devices with high integrity. AMExtractor uses /dev/kmem to execute code in kernel mode, which is supported by most Android devices. Device-specific information is extracted at runtime without any assumptions about the target kernel source code and configuration. AMExtractor has been successfully tested on several devices shipped with different versions of the Android operating system, including the latest Android Lollipop. Memory images dumped by AMExtractor can be exported to other forensic frameworks for deep analysis. A rootkit was successfully detected using the Volatility Framework on memory images retrieved by AMExtractor. %G English %Z TC 11 %Z WG 11.9 %2 https://inria.hal.science/hal-01758679/document %2 https://inria.hal.science/hal-01758679/file/431606_1_En_19_Chapter.pdf %L hal-01758679 %U https://inria.hal.science/hal-01758679 %~ IFIP-LNCS %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-DF %~ IFIP-WG11-9 %~ IFIP-AICT-484