Analysis of Physical Image Acquisition Forensic Tools For Android Smartphones
Analysis of Physical Image Acquisition Forensic Tools For Android Smartphones
Computer Science Department, Al Imam Mohammad Ibn Saud Islamic University, Riyadh, KSA
2. Android Architecture
Understanding Android internals and architecture is at
most important in forensic investigation, due to the
flexibility of Android. Android platform is changing over
time with new versions. According to the differences
between versions, so does the architecture differs.
However, the main core components of Android
architecture are the same. Android architecture has four
main layers, as shown in Figure 1:
Fig 1. Android architecture.
2.1 Linux Kernel
Understanding Linux kernel is the most important, as it is
the basic of Android architecture [8]. It supports the core
3. Data Acquisition Procedure
services, such as memory, network, and process
Different scenarios of data acquisition process from
management, and security. It also maintains various drivers
Android smartphones which forensic examiners may adopt.
for almost all of the hardware [8, 9].
By using the proper procedure, forensic examiners may
retrieve maximum information from the smartphone, so
2.2 Library and Android Runtime
that the acquired data can be further analyzed and
Android includes a set of libraries written in C/C++ [8].
documented in the safest and least intrusive manner as
Libraries, such as Standard CSystem Library, Media
possible. The forensic examiner must follow the
Libraries, 3D Libraries, are used by the components of the
procedures in order to preserve the stored data on the
system through the Application Framework layer [9].
target smartphone [11].
The Android runtime section provides a key component
called Dalvik Virtual Machine (DVM) which is a kind of 3.1 Data Preservation Procedures
Java Virtual Machine specially designed and optimized for
The forensic examiner should check the status of the target
Android [8]. It also provides as set of core libraries which
smartphone, on or off. When the smartphone is powered
enable developers to write Android applications using
off, the forensic investigator checks its memory card. If the
standard Java programming language [8]. A set of core
memory card cannot be removed (i.e. internal memory),
libraries and DVM compose an Android runtime, where
the data can be copied using standard USB card reader. If
every running application holds its own instance of the
the memory card can be removed, then remove the
DVM and executes in its own process [9].
memory card and copy it into a forensic memory card to
ensure its preservation. The data can be copied using the
2.3 Application Framework
same approach used with pen drives. Another, use forensic
This layer provides many higher-level services to Java
tools to copy the data and then generate hash values of the
applications that can be exploited [8, 9]. Application
duplicate data. At the end of the procedure, the forensic
developers can consume and provide services through of a
memory card with the copied data should be returned to
wide set of Application Programming Interfaces (APIs),
the smartphone.
always respecting the security constraints enforced by the
framework [9]. 3.2 Network and Connection Isolation Procedures
It is important to isolate the smartphone from the network
2.4 Application
to prevent any alteration of data. The smartphone can be
The highest layer includes a bundle of programs (e.g.,
isolated by using a room with physical insulation from
contact manager, calendar, SMS program, web-browser, an
electromagnetic signals, or simply set the smartphone to
email client) written in Java Programming Language [10].
flight or offline mode. As the forensic examiner turns the
smartphone on, he must immediately configure it to such
connectionless mode, to avoid data transmission, receiving
calls or SMS. Whenever the smartphone receives an
information, such as incoming call, SMS, or email, the
40 IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.11, November 2016
examiner should document and describe it in the final access the smartphone. This method request support
report. from manufacturers and authorized service centres.
When the smartphone is isolated from telecommunication 3. Software access methods, are usually the easiest
networks, the examiner should check if the smartphone has way even though it depends on the handset model
been configured to provide an authentication mechanism and Android version.
(e.g., password or pattern). After that, the examiner should The examiner must use the least intrusive method to avoid
complete the data acquisition procedures depending on the compromising the evidence. If the password or the pattern
access control mechanism which is configured on the has been obtained when the smartphone was seized, it
device. should be tested. If the examiner not succeeded, he should
check if the smartphone is configured to accept USB
3.3 Data Acquisition of Smartphone without Access debugging connections using a ADB tool. If he succeeds,
Control Procedure he attempts to gain super user access control privileges to
One situation, which is the simplest, is to have an unlocked resume the acquisition process, as mentioned earlier in the
smartphone with removable memory card. As mentioned last section. Even when there are no privileges to super
earlier, the examiner should extract data from memory user access control to the smartphone, the examiner can
cards at first and then reinstall into the smartphone the install applications through the ADB tool to bypass the
forensic cards that have received the copies. The examiner access control system. In case where it is not possible to
should now check the status of super user privileges in bypass the access control system or USB debugging access
Android smartphone. If it is enabled, the examiner can gain is disabled, it is left to the examiner to acquire the data
access to all stored data in the smartphone without any from the removable memory card that may be installed on
restriction by using USB debugging tool ADB and make a the smartphone.
copy of its internal memory.
However, if the super user privileges are disabled in the 3.5 Acquisition Documentation
smartphone, in this case some Android smartphones can be All the techniques and procedures that have been used
acquired using bootloader mode or recovery mode. The must be documented by the examiner, in order to facilitate
examiner should evaluate the possibility to apply those the analysis of the extracted data. The better documenting
techniques on that kind of smartphone. Some of the the data acquisition procedure, the more trust will be given
available mobile device forensic tools that can be used by to the examination results. The examiner should register
examiners do not use user privileges to acquire data, such the hash codes of data generated and extracted during the
as Cellebrit UFED and Oxygen. Instead Cellebrit UFED acquisition process carefully. He must also document any
uses bootloader mode. It is up to the examiner to choose an caveats that he faced during the acquisition process, such
efficient mobile device forensic tool to recover a complete as receiving an e-mail or SMS before the smartphone have
copy of the internal memory. been isolated from telecommunication networks.
dmd module requires a minimal footprint, and minimal 4.4 Android Memory Extractor (AMExtractor)
interactions are required with userland. The authors AMExtractor [3] is a tool for acquiring volatile memory
showed that about 99.46% of pages correctly captured from Android devices. AMExtractor uses the /dev/kmem
over TCP connection, and 99.15% of pages correctly device to execute code in kernel space. This will avoid the
captured to SD card. The proposed module supports all restriction of loadable kernel module and provide the
Android devises, but it is still not considered to be a ability to work on the latest stock ROMs without any
generic module. Moreover, Wächter [14] concluded that modifications. AMExtractor does not need the source code
LiME tool in not feasible for memory forensic in law of the target smartphone and it is compatible with most
enforcement for several reasons: identifying the model, Android operating system versions. Unlike other tools,
identifying Android version, lock screen, root exploit, AMExtractor runs in kernel mode, which makes the tool
availability of sources, kernel configuration, and evidence forensically sound, as it has minimum impact on target
erosion. smartphones. Furthermore, running the device on the
kernel mode minimizes copying data and fines hidden data
4.2 Android Physical Dump (APD) from user mode. H. Yang et al. [3] showed that the
APD was developed by S. Yang et al. [15] in 2015. The acquired data using AMExtractor is nearly the same as
tool is based on analyzing the firmware update protocols of acquired data using LiME.
Android smartphones. Therefore, it acquires internal
memory through the Android update protocols of Android 4.5 ANDROPHSY
devices' bootloader. It supports dumping both partition and ANDROPHSY is an open source tool that was developed
entire memory. The format of the acquired data using APD in 2015 by I. Akarawita et al. [16]. It is the first open-
is raw data that can be analyzed through smartphone source tool that supports the all phases of the digital
forensic analysis tools. The authors proved that the forensic process. ANDROPHSY architecture consists of
proposed method guarantees the integrity of the acquired four major modules: case handling, acquisition, analysis
data. They showed that APD acquires the data at a high support, and reporting module. In case handling module,
speed; it took about 30 min to acquire 32 GB memory, case creation and backup archive functionalities for
while UFED 4PC took 120 min on average. APD can be specific case are provided. In acquisition module, it
executed despite of the restriction due to screen lock; by provides physical and logical acquisition. In analysis
turning off the phone and rebooting in the firmware update module, a complete examination and analysis of the
mode rather than normal boot mode. APD tool supports removed data. And last the reporting module, a report in
over 80 of the latest Android models. However, the main PDF format is generated. In order to use this tool, a
drawback of the method is that it requires to analyze the single .jar file and configuration script are need to be
firmware update protocol whenever new Android installed separately.
smartphones are launched. Focusing on physical acquisition in this tool, the authors
used low level Linux and Android built-in forensic
4.3 Hawkeye functionalities such as dd and Android Debug Bridge (adb)
Hawkeye was proposed for physical acquisition purposes commands. The adb commands is used for connection and
in 2016, by Guido et al. [6]. The purpose of Hawkeye is communication between Android smartphone and
focusing on reducing the amount of data, redundant data, workstation over USB. The dd command is a built in
that needs to be transferred during the physical acquisition. command line utility used to recover raw image from
Thus, decreasing the overall acquisition time. Hawkeye physical drives. ANDROPHSY exploits kernel to gain root
runs Android smartphones on either custom bootloader or access, which minimizes data alteration. It provides user
recovery mode in order to acquire physical images. The access control and case management for authentication and
tool temporarily installs hawkeye agent into the target privacy. It does not use SD card as a collection target.
smartphone’s volatile storage. The agent is provided with a Instead, the data are transferred over TCP connection.
list of baseline hashes and partitions. The agent will then
identify and send only necessary data blocks to the 4.6 Android Digital Autopsy (ADA)
backend PMF architecture via USB. The authors chose ADA is an open source digital forensic tool that was
PMF for several reasons: converting images into their raw developed in 2016 by R. Fasra et al. [17]. The tool
format, writing back automatically. The agent can acquire performs physical, logical, and file system acquisition. The
a partition or full smartphone’s internal memory. Hawkeye authors used a device with multimedia card (MMC)
could successfully acquire the internal memory on 16 GB partition layout. The developed a script file to automate the
memory in 7 min. physical acquisition process. The script file identifies the
data blocks, then uses dd commands to acquire RAW
images of the blocks after gaining root access. The
42 IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.11, November 2016
recovered data are then stored in an external storage card, 4.11 MOBILedit! Forensic
i.e. SD card. Along with the proposed tool, the authors MOBILedit! Forensic [23] allows to retrieve, search, and
developed ADA Analysis Tool, but unfortunately it is only view all data, including deleted data, stored on a
for logical acquisition smartphone with only few clicks. This tool is able to
support all smartphones powered by Android and iOS. It is
4.7 Cellebrite UFED frequently updated and upgraded with new features to
Cellebrite UFED [18] is a commercial forensic tool that support more smartphones. The tool has changed the way
performs physical, logical, file system, and password this evidence is obtained and presented. It generates
acquisition on wide range of devices and platform, such as detailed forensic reports ready to be presented in
Android. It also performs decoding, analysis, and reporting. courtroom. The report could be generated in any language.
UFED can acquire data from all Android OS versions.
4.12 ViaExtract
4.8 Oxegen Forensic Suite ViaExtract [24] is a physical and logical extraction tool
Oxygen Forensic Suite [19] is one of the leading forensic created by ViaForensics. It offers a guided data acquisition,
tools that supports wide range of smartphones. It is used by powerful analysis, and flexible reporting features for
Law Enforcement, army, police department, and other Android smartphones. ViaExtract uses device rooting
government authorities, in more than 50 countries all over wizard to gain root access of most smartphones with only
the world. It enables investigators to perform physical click of a button. This tool allows examiners to crack
acquisition of Android smartphones, advanced passcode to extract data from internal and external storage.
examination, and analysis of raw data and of device images It provides a global search feature for greater speed and
extracted from the smartphone. It allows a fully automated ease of use. This feature allows the examiner to search all
acquisition and analysis of supported smartphones. It can the content types extracted in all the currently opened
acquire a 16 GB smartphone in approximately 45 minutes. acquisitions at once. ViaExtract works on many of the
It offers a well-defined report for the examiner that most popular Android smartphones.
summarizes smartphone activities.
4.13 Mobile Phone Examiner Plus (MPE+)
4.9 XRY Physical MPE+ [25] is a mobile device investigation tool that
MSAB [20] provides products for extraction, analyzing, includes enhanced smartphone acquisition and analysis
and reporting. XRY Physical tool supports extraction of capabilities It supports wide range of platforms and
internal memory and removable media without changing devices. It allows examiners to quickly collect, easily
the target device. It also allows users to generate hash identify, and effectively obtain the data. Like DS, MPE+
values of the memory image, as well as individually can search through a smartphone’s memory dump for
decoded file. XRY Physical recovers raw data from the crucial evidence [22]. The examiners can acquire more
target smartphone by bypassing the operating system and data from iOS and Android devices 30% faster than any
offers the chance to go deeper and recover deleted data other tool in the market. MPE+ includes a robust and
from the target smartphone. The physical extraction is superior analysis tools. To perform physical acquisition, an
separated into two distinct stages: the initial dump stage, empty forensic SD card, holds temporarily MPE+’s agent,
where raw data is recovered from the smartphone, and should be inserted in a target smartphone. Use a tool (e.g.
decoding stage, where the tool can automatically SuperOneClick) to gain Shell Root, i.e. not full root.
reconstruct the data into meaningful information. The
extracted data can be viewed by XAMN Spotlight.
5. Comparative Analysis
4.10 Device Seizure (DS)
DS [21] supports physical, logical, file system, and It is very hard to evaluate tool performance, as their
password extraction. It provides a complete analysis and capabilities varied. In this paper physical forensic tools are
report on all acquired data. It supports wide range of compared in terms of cost, user friendly, data recovery
platforms and devices. By using DS physical acquisitions, with screen lock, data integrity, partition data recovery,
most, but not all, deleted data can be recovered from ways to export data, forensic phases support, and
smartphone. It supports physical acquisitions for Android supporting generic Android smartphones. Table 1
up to 4.4.2 (except for version 3). DS has low minimum illustrates the summery of the evaluated forensic tools.
system requirements, so it can run on any device. It can
search through a smartphone’s memory dump for crucial 5.1 Open Source
evidence [22]. The most powerful mobile devices forensic tools, such as
Oxygen, UFED, and MSAB XRY, are expensive and not
IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.11, November 2016 43
affordable, as they are intended for not personal use. physical images from Samsung Galaxy S II family
Besides commercial tools, there are free open source powered by Android 2.3.4 or 2.3.5 [25]. ANDROPHSY,
mobile devices forensic tools, such as LiME, AMExtractor, DS, and MSAB XRY support bypassing screen lock of
ADA, and ANDROPHSY, that compete the commercial Android smartphones [19, 20, 21]. UFED and viaExtract
tools in many terms (e.g. supported devices, acquired data, can bypass any kind of lock and acquires data only if USB
integrity, friendliness) to achieve best results. Debugging is enabled [18, 24]. Oxygen can create physical
images and bypass lock screen for some of Samsung
5.2 User Friendly Galaxy Note family smartphones [19].
Almost all commercial tools provide users with easy-to-use
interface for data extraction, analysis, and reporting. They 5.4 Data Integrity
are designed with a simple interface to navigate, along with Integrity of evidence is a significant dimension in forensics,
a wizard to guide users through the entire process. Some of which describes the need of evidence to be integral and not
them supports multi-language user interface, such as altered during acquisition and analysis. Some of the mobile
Cellebrite UFED and Oxygen. ANDROPHSY is the only device forensic tools required a smartphone to be booted
open source forensic tool that provides users with friendly into normal mode for getting physical images, which
interface. inherently makes changes to a smartphone's storage. Other
mobile device forensic tools ran in the smartphone's
5.3 Bypass Screen-Lock recovery mode or through the bootloader, which are more
All Android smartphones could be locked using either forensically sound. ADB tool preserved integrity by
pattern or password, and delivered with USB debugging booting the target smartphone in the firmware update mode
disabled for security reasons. Therefore, USB debugging which guarantees the integrity of artefact even after
should be enabled in order to apply existing acquisition physical acquisition multiple times [15]. Integrity can be
methods. Most of the software based forensic tools, such verified through hash value checksum. DS, MOBILedit!
as MOBILedit! Forensic, use the ADB protocol for Forensic, UFED, Oxygen, MSAB XRY, ADA, Hawkeye,
physical acquisition. However, USB debugging must be and ANDROPHSY verify data integrity by calculating
enabled to use the ADB protocol and apply acquisition hash values (e.g., MD5, SHA-1, SHA-256, SHA-512)
methods. ADB tool overcomes this problem by executing among images produced. MPE+ builds a Python Script that
physical acquisition after turning off the smartphone and acts upon a copy of evidence rather than the original binary
rebooting in the firmware update mode [15]. Regardless of data, thus original data will not be altered [21, 25].
whether USB debugging is enabled or if the device is in a
rooted state, MPE+ can bypass screen locks and get