Abstract
Android devices is emerging as a significant force for multimedia big data, which hold an enormous amount of information about the users. The security and privacy concerns have arisen as a salient area of inquiry since malicious attackers can use memory dump to extract privacy or sensitive data from these devices. This paper presents a code protection approach for Android devices which protects certain processes from memory acquisition by process memory relocation. The protected processes are relocated to the special memory area where the kernel is loaded, and thus these processes will be covered when android reboots and attackers can not recognize which protected programs have been performed on the devices. The experiment results show that the proposed approach disables forensics tools like FROST to obtain these processes and has little impact on the normal operation of the protected program. Compared with the similar methods, the proposed method can protect greater data quantity but it occupies no additional storage resources.
Original language | English |
---|---|
Pages (from-to) | 11137-11157 |
Number of pages | 21 |
Journal | Multimedia Tools and Applications |
Volume | 77 |
Issue number | 9 |
DOIs | |
Publication status | Published - May 2018 |
Keywords
- Android
- Anti-forensics
- Code protection
- Memory acquisition
- Process memory relocation