Ανάλυση αποτυπωμάτων μνήμης εφαρμογών Android οι οποίες εφαρμόζουν κρυπτογράφηση AES βασιζόμενη σε μυστικό κωδικό

View/ Open
Subject
Android (Electronic resource) ; ΚρυπτογραφίαKeywords
Κρυπτογράφηση με χρήση κωδικού ; Κλειδί κρυπτογράφησης ; Κρυπτογράφηση AES ; Παράμετροι κρυπτογράφησης ; Δυαδική εντροπία ; Memory dumps ; Password Based Encryption (PBE) ; Encryption key AES ; Encryption ; Cipher parameters ; Binary entropy ; Java programAbstract
Subject matter of this study is, the memory dump analysis of Android applications that use AES Password Based Encryption (PBE).
For the implementation of this analysis a custom android application named “AES Android Forensics”, was created which simulated the applications that use AES Password Based Encryption. Main purpose of this application is to show the AES encryption key, and it’s location to the memory dump.
Based on the analysis and findings of the AES Android Forensics application, ten similar android AES PBE applications were examined. In five of them, all of the AES cipher parameters were found including the encryption key.
For further automation of the above stated process three more Java programs were developed.
The first one emulates the five android applications in Java environment.
The second one analyzes the pattern of the encryption keys created by these android applications.
Finally the third one, searches in memory dumps for AES PBE encryption keys, based on binary entropy.