In the future, automatic (scripted) generation of
LiME LKMs and Volatility profiles for a given
device would greatly simplify the process of memory
extraction and analysis. This could, for instance, be
achieved via distribution of a Linux VM (virtual
machine) containing the required scripts, to be
launched on the investigator’s forensic workstation.
With a target device that fulfills the requirements
set forth in section 6, the investigator would need to
supply only the source code for the kernel running on
the device and quickly be able to compile a working
LiME LKM for the device, as well as generate a
Volatility profile for memory extracted from the
device with the LKM.
A cleaner forensic approach for memory extraction
from Android devices, free from the limitations
shown in section 7, would require a completely new
approach which does not hinge upon the injection of
a kernel module. This would, however, require the
discovery of a vulnerability in Android which can be
triggered without modification of the running system.
Even if such a vulnerability were located, it would
only be a matter of time until Android was patched to
remove the vulnerability.
REFERENCES
Android Developers, Security Tips, [Online], Available:
http://developer.android.com/training/articles/security-
tips.html [4 Sep 2015].
Android Open Source Project, Encryption, [Online],
Available: https://source.android.com/devices/tech/
security/encryption/index.html [4 Sep 2015].
Begun, D., A., 2011, Amazing Android Apps for Dummies,
Wiley & Sons.
Caban, D., 2014, Acquiring Linux Memory from a Server
Far Far Away, [Online], Available: http://blog.
opensecurityresearch.com/2014/05/acquiring-linux-
memory-from-server-far.html [4 Sep 2015].
Case, A., 2012, Phalanx 2 Revealed: Using Volatility to
Analyze an Advanced Linux Rootkit, [Online], Available:
http://volatility-labs.blogspot.de/2012/10/ phalanx-2-
revealed-using-volatility-to.html [4 Sep 2015].
Cinar, O., 2015, Android quick APIs reference, Apress.
Elatov, K., 2015, Recover LUKS Password from Android
Phone, [Online], Available: http://elatov.github.io/
2015/03/recover-luks-password-from-android-phone/
[4 Sep 2015].
Hale, M., 2013a, AndroidMemoryForensics - Instructions
on how access and use the Android support, [Online],
Available: https://code.google.com/p/volatility/wiki/
AndroidMemoryForensics [4 Sep 2015].
Hale, M., 2013b, LinuxMemoryForensics - Instructions on
how to access and use the Linux support, [Online],
Available: https://code.google.com/p/volatility/wiki/
LinuxMemoryForensics [4 Sep 2015].
Ligh, M., H., Case, A., Levy J., Walters, A., 2014, The Art
of Memory Forensics: Detecting Malware and Threats
in Windows, Linux, and Mac Memory, Wiley.
Linux Profiles, 2012, LinuxProfiles - Linux Profile
Reference, [Online], Available: https://code.google.
com/p/volatility/wiki/LinuxProfiles [4 Sep 2015].
Logen, S., Höfken, H., Schuba, M., 2012, Simplifying RAM
Forensics - A GUI and Extensions for the Volatility
Framework, Proceedings of 5th International
Workshop on Digital Forensics, Prague, Czech
Republic.
Luttgens, J., T., Pepe, M., Mandia, K, 2014, Incident
Response & Computer Forensics, 3rd edition,
McGraw-Hill Education.
Müller, T., Spreitzenbarth, M., 2013, FROST – Forensic
Recovery of Scrambled Telephones, in Applied
Cryptography and Network Security, 2013, Eds.
Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini,
R., Springer.
Pomeranz, H., 2014, Linux Memory Grabber - A script for
dumping Linux memory and creating Volatility(TM)
profiles, [Online], Available: https://github.com/halpo
meranz/lmg/blob/master/README [4 Sep 2015].
Pryor, K., 2013, Volatility Linux Profiles, [Online],
Available: http://digiforensics.blogspot.de/2013/12/
volatility-linux-profiles.html [4 Sep 2015].
Raman, S., 2014, Installing Linux Profile in Volatility
,
[Online], Available: https://shankaraman.wordpress.
com/2014/05/23/installing-linux-profile-in-volatility/
[4 Sep 2015].
Sylve, J., T., 2011, Android Memory Capture and
Applications for Security and Privacy, M.S. Thesis,
University of New Orleans, New Orleans.
Sylve, J., T, 2015, LiME ~ Linux Memory Extractor,
[Online], Available: https://github.com/504ensicsLabs
/LiME/blob/master/README.md [4 Sep 2015].
Tilbury, C., 2013, Getting Started with Linux Memory
Forensics, [Online], Available: http://forensicmethods.
com/linux-memory-forensics [4 Sep 2015].
VOLIX II, 2014, Volatility Interface and Extensions,
[Online], Available: http://www.it-forensik.fh-
aachen.de/projekte/volixe, [4 Sep 2015].