Acquisition of digital evidence in android smartphones
|
|
|
- Malcolm Hoover
- 9 years ago
- Views:
Transcription
1 Edith Cowan University Research Online Australian Digital Forensics Conference Security Research Institute Conferences 2011 Acquisition of digital evidence in android smartphones Andre Morum de L. Simao Brazilian Federal Police Fabio Caus Sicoli Brazilian Federal Police Laerte Peotta de Melo University of Brasilia Rafael Timoteo de Sousa Junior University of Brasilia Originally published in the Proceedings of the 9th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, 5th -7th December 2011 This Conference Proceeding is posted at Research Online.
2 ACQUISITION OF DIGITAL EVIDENCE IN ANDROID SMARTPHONES Andre Morum de L. Simao 1, Fabio Caus Sicoli 1, Laerte Peotta de Melo 2, Flavio Elias de Deus 2, Rafael Timoteo de Sousa Junior 2 1 Brazilian Federal Police, Ministry of Justice 2 University of Brasilia, UnB 1,2 Brasilia, Brazil 1 {morum.amls, sicoli.fcs}@dpf.gov.br 2 {peotta, flavioelias, desousa}@unb.br Abstract From an expert's perspective, an Android phone is a large data repository that can be stored either locally or remotely. Besides, its platform allows analysts to acquire device data, collecting information about its owner and facts that are under investigation. This way, by exploring and cross referencing that rich data source, one can get information related to unlawful acts and its perpetrator. There are widespread and well documented approaches to forensic examining mobile devices and computers. Nevertheless, they are not specific nor detailed enough to examine modern smartphones, since these devices have internal memories whose removal or mirroring procedures are considered invasive and complex, due to difficulties in having direct hardware access. Furthermore, specific features of each smartphone platform have to be considered prior to acquiring its data. In order to deal with those challenges, this paper proposes a method to perform data acquisition of Android smartphones, regardless of version and manufacturer. The proposed approach takes into account existing techniques of computer and cell phone forensic examination, adapting them to specific Android characteristics, its data storage structure, popular applications and the conditions under which the device was sent to the forensic examiner. The method was defined in a broad fashion, not naming specific tools or techniques. Then, it was deployed into the examination of six Android smartphones, addressing different scenarios that an analyst might face, and was validated to perform an entire evidence acquisition. Keywords Forensics; data acquisition; evidence analysis; mobile phone; smartphone; Android. INTRODUCTION In 2011, the Android operating system has exceeded the number of handsets sold in other systems for smartphones (Canalysis, 2011). The system has a wide acceptance in the market and it is conjectured that this is due to being open source and supporting the latest features and applications available for this type of mobile equipment. Given its ability to provide a large number of features to the user, a smartphone with the Android operating system can store a significant amount of information about its owner, being a source of evidence for facts one wants to clarify or to obtain information to support an investigation (Rossi, M., 2008). Some of the features of Android are: browsing the Internet, image and video capture, creating and viewing documents, notes, calendar, contact management, GPS location and map navigation. From an application developer's viewpoint, Android has features that facilitate the development, publication and installation of created applications, what enhances the functionalities provided by the platform. Unlike the data acquisition approach for computer environments, when data can usually be extracted in the same state it was found and is preserved from the time of its seizure, extraction of data from smartphones typically require intervening on the device. Moreover, given that they use embedded memories, whose direct hardware access is delicate and complex, sometimes it's needed to install applications or use tools directly on the device to proceed with the stored data acquisition. Thus, the analyst must have the expert knowledge needed to carry out forensic procedures on the device the least intrusive manner possible, controlling the environment in order to avoid loss, alteration or contamination of evidence data (Association of Chief Police Officers, 2008), which will give reliability to the forensic procedure. 116
3 ANDROID PLATFORM The Android platform consists of the operating system, the SDK (Software Development Kit) and its applications. The SDK is a set of tools provided by the Google company that provides a development environment for creating Android applications. One of the tools is the Android Debug Bridge (ADB), which provides a communication interface to an Android system using a computer. When connected through this interface, a computer is able to access a command shell, install or remove applications, read log files, transfer files between the station and the device, among other actions. The Android operating system uses the sandbox concept, where applications have reserved areas, with isolated process execution environments and limited access to resources. This way, applications cannot access areas that are not explicitly allowed (Google Inc., 2011). However, access to features may be authorized by the permissions set in the "AndroidManifest.xml" file. At the time of application installation, that file tells the user what resources will be used on the smartphone. He can accept the installation of the application after being informed of the resources that will be used or simply refuse the installation, if he does not agree with the features that the application wishes to access. Another feature of the Android OS is the use of the SQLite database, which is free and open source. It is an easy to use relational database, which stores in a single file the complete structure of data objects (tables, views, indexes, triggers) (SQLite, 2011). Such database does not need any configurations and uses file system permissions to control access to its stored data. Regarding the file system, currently most of Android devices adopt YAFFS2 (Yet Another Flash File System 2), which is a file system designed for flash memory and its peculiarities. It is worth noting that the major forensic tools available in the market are not compatible with that file system, making it difficult to mount Android partitions and access data stored there. However, as quoted by Andrew Hoog (Hoog, A., 2011) in late 2010, it was observed that some Android handsets were already using the EXT4 (Fourth Extended File System). There is a migration tendency to this file system, in order to support dual-core processor and multiprocessing, and to use e- MMC memories, (Embedded MultiMediaCard), which already work simulating block storage devices, that are more robust, mature and have more commercial acceptance. Access to system partitions is restricted to the Android operating system. By default, users do not have permission to access system reserved areas. The system is shielded in order to prevent malicious or poorly developed applications to affect the OS's stability and reliability. However, it is possible to exploit a set of system or device vulnerabilities to obtain super user (root) privileges. Thus, it is possible to use applications or a shell that has full and unrestricted access to the system. As a result, a forensic analyst can make a mirror copy of all of the system partitions as well as access files which were not accessible by using Android conventional credentials. The techniques vary depending on each Android version and may also depend on the device make and model. Moreover, those techniques are often invasive and may even damage data stored on the device, so they should be used carefully. The operating system has authentication mechanisms that use of passwords, tactile patterns or biometric information. According to the NIST guide on cell phones forensics (Jansen, W.; Ayers, R., 2007), there are three possible methods to unlock a device: investigative, software-based or hardware-based. Those can be applied to Android equipment depending on the seizure circumstances, device model and system version. Given the characteristics described, in order to conduct a forensic data extraction, besides having knowledge about the Android platform, an analyst should evaluate the procedures to be adopted. For instance, there are scenarios in which the phone may be turned on or off, have internal or removable memory, be locked or unlocked, have access through USB debug mode or not, have some applications running that contain useful information for an investigation, and even may have root privileges enabled. Thus, the analyst must assess the correct procedures to be adopted depending on the Android smartphone status. DATA ACQUISITION METHOD FOR ANDROID SMARTPHONES Considering the unique characteristics of the Android platform and different scenarios which a forensic analyst may come across, a data acquisition method is proposed and its workflow is shown in Figure 1. In the figure, different scenarios and their respective procedures to be adopted by the analyst are presented. By using the proposed method, a forensic analyst may retrieve maximum information from the mobile device, so that the evidence may be documented, preserved and processed in the safest and least intrusive manner as possible. 117
4 Initial procedures for preservation of the data in a smartphone Upon receiving a smartphone, the forensic analyst must follow the procedures in order to preserve the stored data on the seized equipment. So, he should check if the phone is turned on or not. If the phone is powered off, one should evaluate the possibility of extracting data from its memory card. It should be pointed that some Android phones have an internal memory card, so it is not possible to remove it in order to copy its data through the use of a standard USB card reader. On the other hand, if it is feasible to remove the memory card, it should be removed and duplicated to an analyst memory card to ensure its preservation. To copy data from the memory card, one may use the same approach used with pen drives. The forensic expert could use forensic tools to copy the data or even run a disk dump and then generate the hash of the duplicate data. At the end of the process, the analyst' memory card with the copy should be returned to the device. Figure 1 - Workflow with the process of acquiring data from a smartphone with the Android operating system. The next step is to isolate the telephone from the network. The ideal situation is to use a room with physical insulation from electromagnetic signals. However, when one does not have such an infrastructure, he should set the smartphone to flight or offline mode. From the moment the power is on, he must immediately configure it to such connectionless mode, thus avoiding data transmission, receiving calls or SMS (Short Message Service) after the equipment seizure time. If by any chance, before it is isolated from the network, the phone receives an incoming call, message, or other information, the analyst should document and describe it in its final report, which will be written after the data extraction, examination and analysis processes. With the smartphone isolated from telecommunication networks, the forensic analyst should check if the Android has been configured to provide an authentication mechanism, such as a password or tactile pattern. Afterwards, he should carry out the procedures described in the following sections, which depend on the access control mechanism which is configured on the device. Smartphone without access control The least complex situation that an examiner may encounter is one which the mobile is not locked and is readily able to have its data extracted. In this situation, one must first extract data from memory cards, if they have not 118
5 been copied, and in case of removable memory cards, reinstall into the device the cards that have received the copies, preserving the original ones. With the data from memory cards extracted and properly preserved, the examiner should check if the Android has super user privileges enabled. The application called "Superuser" can be installed to provide access to such privileges. From the moment the analyst is faced with an Android phone with super user privileges, he can gain access to all stored data in the device without any restriction. Using the USB debugging tool ADB (Android Debug Bridge), present in the Android SDK, one can connect to the device, access a command shell with super user privileges and make a copy of the system partitions stored in its internal memory, as illustrated in Figure 2. C:\Android\android-sdk\platform-tools>adb devices List of devices attached E014 device C:\Android\android-sdk\platform-tools>adb -s E014 shell $ su - su # mount grep mtd mount grep mtd /dev/block/mtdblock6 /system yaffs2 ro,relatime 0 0 /dev/block/mtdblock8 /data yaffs2 rw,nosuid,nodev,relatime 0 0 /dev/block/mtdblock7 /cache yaffs2 rw,nosuid,nodev,relatime 0 0 /dev/block/mtdblock5 /cdrom yaffs2 rw,relatime 0 0 /dev/block/mtdblock0 /pds yaffs2 rw,nosuid,nodev,relatime 0 0# cat /proc/mtd cat /proc/mtd dev: size erasesize name mtd0: "pds" mtd1: "cid" mtd2: "misc" mtd3: "boot" mtd4: "recovery" mtd5: 008c "cdrom" mtd6: 0afa "system" mtd7: 06a "cache" mtd8: 0c "userdata" mtd9: "cust" mtd10: "kpanic" # ls /dev/mtd/mtd* ls /dev/mtd/mtd* /dev/mtd/mtd6 /dev/mtd/mtd6ro /dev/mtd/mtd7 /dev/mtd/mtd7ro /dev/mtd/mtd8 /dev/mtd/mtd8ro # dd if=/dev/mtd/mtd6ro of=/mnt/sdcard/pericia/mtd6ro_system.dd bs=4096 dd if=/dev/mtd/mtd6ro of=/mnt/sdcard/pericia/mtd6ro_system.dd bs= records in records out bytes transferred in secs ( bytes/sec) # dd if=/dev/mtd/mtd7ro of=/mnt/sdcard/pericia/mtd7ro_cache.dd bs=4096 dd if=/dev/mtd/mtd7ro of=/mnt/sdcard/pericia/mtd7ro_cache.dd bs= records in records out bytes transferred in secs ( bytes/sec) # dd if=/dev/mtd/mtd8ro of=/mnt/sdcard/_pericia/mtd8ro_userdata.dd bs=4096 dd if=/dev/mtd/mtd8ro of=/mnt/sdcard/_pericia/mtd8ro_userdata.dd bs= records in records out bytes transferred in secs ( bytes/sec) # ls /mnt/sdcard/pericia ls /mnt/sdcard/pericia mtd6ro_system.dd mtd7ro_cache.dd mtd8ro_userdata.dd Figure 2 - Commands to list connected devices, display partition information, and generate the partitions dump. It should be pointed that, by carrying out procedure described in Figure 2, the mirrored partition images will be written to the memory card which is installed in the device. In some situations, it may not be possible to replace the original memory card by an analysts one. Nevertheless, regardless of its replacement, removable media's data must have been mirrored prior to the system mirroring and copying. By doing that, data stored in the original memory card, seized with the smartphone, are preserved and the forensic expert should point that in his report that will be produced by the end of data analysis. After mirroring the partitions, one should observe the running processes and assess the need to get run-time information, which is loaded in the device's memory. Hence, it is possible to extract memory data used by running applications to access sensitive information, such as passwords and cryptographic keys. By using a command shell with super user credentials, the /data/misc directory's permissions must be changed. Afterwards, one must kill the target running process, so that a memory dump file for the killed process is created (Cannon, T., 2010). Data extraction of a telephone with available "super user" credentials may be finished in this moment. Figure 3 displays the technique described by Thomas Cannon (Cannon, T., 2010). 119
6 # chmod 777 /data/misc chmod 777 /data/misc # kill kill # kill kill # kill kill # kill kill # ls /data/misc grep dump ls /data/misc grep dump heap-dump-tm pid5797.hprof heap-dump-tm pid6199.hprof heap-dump-tm pid6379.hprof heap-dump-tm pid6440.hprof # C:\android-sdk\platform-tools>adb -s E014 pull /data/misc/heap-dumptm pid5797.hprof 2206 KB/s ( bytes in 1.227s) C:\android-sdk\platform-tools>adb -s E014 pull /data/misc/heap-dumptm pid6199.hprof 2236 KB/s ( bytes in 1.549s) C:\android-sdk\platform-tools>adb -s E014 pull /data/misc/heap-dumptm pid6379.hprof 1973 KB/s ( bytes in 1.779s) C:\android-sdk\platform-tools>adb -s E014 pull /data/misc/heap-dumptm pid6440.hprof 1968 KB/s ( bytes in 1.435s) Figure 3 - Presents the commands to alter a directory's permissions, kill processes to create processes' memory dump files and copy those files to the analyst's station. It is noteworthy that, in order to inspect the acquired data, the analyst should have an examination environment with tools that are capable of mounting images having the device's file system, which is in most cases the YAFFS2. The technique described by Andrew Hoog may be used to examine that file system (Hoog, A., 2011). Nevertheless, it is recommended that a logical copy of system files is made directly to the analyst's workstation, as shown in Figure 4. C:\android-sdk\platform-tools> adb pull /data pericia/ Pull: building file list 684 files pulled. 0 files skipped 857 KB/s ( bytes in s) Figure 4 Copy of logical files stored in the device's "/data" directory to the "pericia" directory in the analyst's workstation. The stored data in the "/data" directory, for instance, contain information regarding the installed applications and system configuration. Logical copy of files will create redundancy that may be useful during the examination phase, especially in situations when it is not necessary to delve into system partitions. In addition, some applications may be active in the system, in such a way that a simple visual inspection may provide information which would be difficult to access by means of analyzing the created image. Moreover, forensic extraction tools may be used to interpret stored data. In situations when the smartphone "super user" privileges are not available, data extraction from its internal memory should be carried out by visually inspecting and navigating through the device graphic user interface. Alternatively, forensic tools and applications may be used to assist the analyst in extracting device's data. Nevertheless, it is important to check the information gathered by such tools, because the Android OS has different versions, as well as manufacturer and telephone carrier customizations, which may interfere in the automated tools' proper functioning. That are numerous applications that may store meaningful information for an investigation, whose data extraction is not supported by forensic tools. It is clear that the forensic analyst needs to have proper knowledge regarding the Android platform and its applications, since relevant information extraction should be conducted in the most complete way. Some Android smartphones allow that their internal memories be copied using boot loader or recovery partitions vulnerabilities, without having "super user" credentials. It is up to the analyst to evaluate if it is possible and viable to apply such techniques for that kind of device. It is suggested that the investigation team should discuss the need of using such techniques and consider the risks and impacts to the exam results. Regarding existing forensic tools, the viaforensics company developed a free tool to law enforcement agencies called Android Forensic Logical Application (AFLogical) (ViaForensics, 2011), whose goal is to extract information from Android smartphones. In addition, recently the commercial tool viaextract was released and, according to viaforensics, it has more consistent and relevant features, such as generating reports. Another very 120
7 useful tool is the "Cellebrite UFED", whose version , released in July of 2011, carry out physical extraction from a few models without the need of "super user" privileges. The same tool has a plugin to view Android's SQLite databases and other application files, such as Gmail, SMS, MMS and contacts. Smartphone with access control In the likely event the Android smartphone has access control, such as a password or tactile pattern, there are still techniques to be used to access the device. According to NIST (Jansen, W., Ayers, R., 2007), there are three ways of gaining access to locked devices. The first one is the investigative method, whereby the researcher seeks possible passwords in the place where the smartphone was seized or even interview the its alleged owner so that he cooperates voluntarily by providing his password. Another way is to gain access via hardware, when the analyst performs a research on that specific given model to determine whether it is possible to perform a non-destructive procedure in order to access device data. In this sense, one may request support from manufacturers and authorized service centers. Finally, there are methods of software access that, even though it depends on the handset model and Android version, are usually the easiest way and can be applied in the forensic analyst's own test environment. To access the system, the analyst must do it the least intrusive manner possible in order to avoid compromising the evidence. If the password or the tactile pattern has been obtained when the device was seized, those should be readily tested. Alternatively, one may use the technique to find the tactile pattern by means of examining the smudge left on the device screen (Aviv, A. J. et al, 2010), before attempting any other way to bypass access control, preventing screen contamination. If the analyst does not succeed, he should check if the Android is configured to accept USB debugging connections using a tool available in the SDK, the ADB. If he succeeds, he attempts to obtain "super user" access credentials to resume the acquisition process, the same way that it would be performed in cases where the mobile device was not locked, because with such permissions, one can get all the stored data in the device, as described previously. Even when there is no "super user" access to the handset, it is still possible to install applications through the ADB tool to overcome the access control system. The technique described by Thomas Cannon (Cannon, T., 2011) is to install the "Screen Lock Bypass" application, available at the Android Market. In this technique, one needs that the Google account password be saved in the Android device, as well as Internet access be enabled, which is considered inadvisable. In this sense, it is recommended that the application is downloaded from another Android device and then installed via ADB on the examined mobile device. Thus, it is possible to perform the screen unlock using Cannon's technique without the need of having the device's Google account password or connecting it to the web. Figure 5 shows Cannon's application installation, as well as its activation, which depends on the installation of any other application, to perform access control unlocking. C:\android-sdk\platform-tools>adb -s E014 shell $ su - su - Permission denied $ exit... C:\android-sdk\platform-tools>adb -s E014 install screenlockbypass.apk 224 KB/s (22797 bytes in 0.100s) pkg: /data/local/tmp/screenlockbypass.apk Success C:\android-sdk\platform-tools>adb -s E014 install AndroidForensics.apk 716 KB/s (31558 bytes in 0.046s) pkg: /data/local/tmp/androidforensics.apk Success Figure 5 Connection via ADB, root access check and application installation in order to ignore access control. In situations where it is not possible to bypass the authentication system or USB debugging access is disabled, it is left to the analyst to copy the data contained in the removable memory card that may be installed on the handset. In those situations, it is very important to report the impossibility to access the device with the used procedures. In addition, if there is another technique that may be applied, be it more invasive or complex, that fact should be informed to whom requested the exams. Consequently, the implications of applying such techniques should be discussed, considering the risks to the given situation, such as permanent damages to the examined smartphone. 121
8 Acquisition documentation It is recommended that all the techniques and procedures used by the analyst be documented, in order to facilitate the examination and analysis of extracted data. Regardless of the path followed by the expert in the workflow illustrated in Figure 1, the process should be recorded, enabling auditability and reliability of the procedures performed by the expert analyst. The analyst should be careful to register the hash codes of data generated and extracted during the acquisition process, as well as state in his report any caveats that he considers important to carry out the examination and analysis stage, like an or SMS received before the smartphone have been isolated from telecommunication networks or even the existence of applications that contain information stored in servers on the Internet, such as cloud computing. The forensic expert, while executing his activities, should consider that the better reported the acquisition process, the more trust will be given to the examination results. The simple condition of the processes be well documented is the first step to conduct an impartial, clear and objective data analysis. VALIDATION OF THE PROPOSED ACQUISITION METHOD The proposed method was tested by using a sample containing six smartphones that had the Android OS. Among those handsets, four different scenarios were identified, summed up and presented in Table 1. Table 1 - Scenarios used to validate the proposed method. Scenario Turned Removable on card Locked Unlockable Super user 1st Scenario (Motorola Milestone II A953) No Yes Yes Yes No 2nd Scenario (Sony Ericson Xperia X10 minipro) Yes No No Does not apply No 3rd Scenario (Motorola Defy) No Yes No Does not apply Yes (Samsung Galaxy S 9000 a ) 4th Scenario (Motorola I1) (Motorola Milestone A853) No Yes No Does not apply No a In addition to the removable microsd card, that phone has a built-in memory card which is not removable. 122
9 Proceedings of the 9 th Australian Digital Forensics Conference In the first scenario, as the device was turned off, first its memory card was removed and mirrored. Then, the memory card holding the copy was inserted into the handset. Subsequently, the smartphone was switched on and set immediately in flight mode. It was noticed that the cell phone was locked, but its USB debugging access was enabled. By using the ADB tool, a shell was obtained but that there were no "super user" permissions available, preventing mirroring system partitions. However, from the ADB, it was possible to install the "Screen Lock Bypass" application (Cannon, T., 2011), which was used to unlock the device, as well as the "Logical Android Application Forensics", a data extraction tool (ViaForensics, 2011). In addition, the extracted data were visually inspected. In the following scenario, the smartphone was not locked and was put into flight mode in order to isolate it from the network. The device in this scenario had a memory card that was not removable. The card data were mirrored (copied entirely), and its own memory was used to extract its information by the "Logical Android Application Forensics" forensic software. Afterwards, data were extracted the same way as the previous scenario. The same way as done in the first scenario, in the third, the memory card was removed and replaced by a mirror, since the device was received turned off. Later, the smartphone was turned on and immediately put into flight mode. It was observed that the mobile device was unlocked and also had a second memory card embedded. That memory card was also mirrored. The smartphone had the "Superuser" application, which provides super user credentials. Thus, the USB debug mode was enabled, an ADB was established, obtaining a shell with "super user" permissions to carry out the system partitions mirroring. RAM data were not copied, because the handset was received switched off and the analysts considered unnecessary to perform such procedure. Then, the Cellebrite UFED System tool was used to extract forensic data from the phone, followed by visual inspection to complement the extracted data. Last but no least, in the fourth scenario, the memory card was removed, mirrored and replaced while the device was still turned off. Then, the phone was turned on and immediately put into flight mode. The phone was unlocked. Thus, the Cellebrite UFED System tool was used to extract forensic data from the phone, with subsequent visual inspection to complement the extracted data. The procedures cited in the method could be directly translated into actions performed onto the examined devices. Thus, it was possible to perform data acquisition of every tested smartphone, demonstrating the suitability and validity of the proposed method for each encountered scenario. CONCLUSION The Android smartphone platform is already the most present among mobile communication devices. However, the existing approaches to forensic examine cell phones and computers are not completely adequate to the peculiarities of that class of devices. Moreover, the existing models of forensic analysis on cell phones do not consider the peculiarities of each platform. A specific method was proposed to address data acquisition of devices that use the Android Platform, taking into account operational system characteristics, its most popular applications and devices hardware features. By means of defining an Android system data acquisition method, it was possible to foresee the difficulties a forensic expert might face, preparing them to perform an entire evidence acquisition, given the situation the handset was forwarded, avoiding mishaps in the data extraction process and missing forensic evidence. The method was proposed in a broad fashion, so that the techniques, procedures and specific tools chosen by the analyst during the workflow do not interfere with its application. So, as new techniques arise, with different approaches to perform a given task, such as unlocking the device, bypassing access control or mirroring partitions, they will be covered by the proposed method, which focuses on the result that each activity produces. The proposed method was validated by its application onto the examination of six Android smartphones, which were grouped into four scenarios, involving different situations that an analyst may encounter. For future work, it is proposed that the method is validated for the Android 3, evaluating its effectiveness in the Google system for tablet devices, making the adjustments that may be required. Another interesting work to be developed would be the creation of a forensic tool that supported the YAFFS2 file system, focused on NAND flash memory, facilitating data extraction and access and also mounting images from those storage media. 123
10 Proceedings of the 9 th Australian Digital Forensics Conference REFERENCES Association of Chief Police Officers. Good Practice Guide for Computer-Based Electronic Evidence. Version 4.0. [S.l.] Aviv, A. J.; Gibson, Katherine; Mossop, Evan; Blaze, Matt; Smith, Jonathan M. Smudge Attacks on Smartphone Touch Screens. 4th Workshop on Offensive Technologies. Washington, DC: [s.n.] Canalys. Android takes almost 50% share of worldwide smartphone market. Canalys website, 1/8/2011. Available at: < Accessed: 3 august Cannon, T. Android Lock Screen Bypass. Thomas Cannon, Available at: < Accessed: 23 march Cannon, T. Android Reverse Engineering. Thomas Cannon, Available at: < Accessed: 23 march Google Inc. Android Fundamentals. Android Developers, Available at: < fundamentals.html>. Accessed: 17 march Hoog, A. Android Forensics - Investigation, Analisys and Mobile Security for Google Android. 1st. ed. [S.l.]: Syngress, Jansen, W.; Ayers, R. Guidelines on Cell Phone Forensics - Recomendations of the National Institute of Standards and Technology. [S.l.] Rossi, M. Internal Forensic Acquisition for Mobile Equipments, n IEEE, SQLite. About SQLite. SQLite, Available at: < Accessed: 5 april ViaForensics. Android Forensics Logical Application (LE Restricted). ViaForensics website, Available at: < android-forensics/android-forensics-logical-application-le-restricted.html>. Accessed: 03 august
Android Physical Extraction - FAQ
Android Physical Extraction - FAQ Nadav Horesh June, 2012 1 Table of Contents Introduction... 3 Android Debugging Bridge (ADB)... 4 Q: What does ADB stand for and how does it work?...4 Q: So can ADB be
KINDLE FORENSICS: ACQUISITION & ANALYSIS
KINDLE FORENSICS: ACQUISITION & ANALYSIS Peter Hannay SECAU School of Computer and Security Science Edith Cowan University Perth, Australia [email protected] Abstract The Amazon Kindle ebook reader supports
How to Install Applications (APK Files) on Your Android Phone
How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android
Design and Implementation of Forensic System in Android Smart Phone
Design and Implementation of Forensic System in Android Smart Phone Xinfang Lee 1, Chunghuang Yang 1 2, Shihj en Chen, Jainshing Wu 2 1 Graduate Institute of Information and computer Education National
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
Discovering authentication credentials in volatile memory of Android mobile devices
Discovering authentication credentials in volatile memory of Android mobile devices Dimitris Apostolopoulos, Giannis Marinakis, Christoforos Ntantogian, Christos Xenakis Department of Digital Systems,
Validating Tools for Cell Phone Forensics
Validating Tools for Cell Phone Forensics Neil Bhadsavle and Ju An Wang Southern Polytechnic State University 1100 South Marietta Parkway Marietta, GA 30060 (01) 678-915-3718 {nbhadsav, jwang}@spsu.edu
Security Service tools user IDs and passwords
System i Security Service tools user IDs and passwords Version 5 Release 4 System i Security Service tools user IDs and passwords Version 5 Release 4 Note Before using this information and the product
Avira Free Android Security (version 1.2) HowTo
Avira Free Android Security (version 1.2) HowTo Table of contents 1. Introduction... 4 2. Supported Mobile Manufacturers... 4 3. Product Overview... 5 4. Installation... 5 4.1 App installation on the device...5
Smart Anytime, Safe Anywhere. Climax Home Portal Platform. Envisage and Enable a Connected Future
Smart Anytime, Safe Anywhere Climax Home Portal Platform Envisage and Enable a Connected Future Climax Home Portal Platform An IP/GPRS-Based Solution to Deliver Smart Home and Mobile Control Services Reliable
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes Table of Contents UFED Basics...3 Extraction Types...4 Logical extraction...5 Logical extractions of ios devices...5
ThinLinX TLXOS NUC / Compute Stick / RePC Installation Guide Creating the Installer (Step 1)
ThinLinX TLXOS NUC / Compute Stick / RePC Installation Guide ThinLinX has created optimized versions of ThinLinX OS (TLXOS) for either the Intel NUC, Intel Compute Stick or RePC making full use of the
A Survey on Mobile Forensic for Android Smartphones
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar Apr. 2015), PP 15-19 www.iosrjournals.org A Survey on Mobile Forensic for Android Smartphones
Instrument Software Update Instructions. Keysight X-Series Signal Analyzers (PXA/MXA/EXA/CXA) Upgrading an older version to A.12.
Instrument Software Update Instructions Keysight X-Series Signal Analyzers (PXA/MXA/EXA/CXA) Purpose Upgrading an older version to A.12.09 and above The purpose of this document is to outline the instrument
Into The Droid. Gaining Access to Android User Data DEF CON 20
Into The Droid Gaining Access to Android User Data DEF CON 20 Introduction Why this talk is useful Defend access / gain access Device seizure, loss, border crossing, stop and search, espionage... The company
SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules
Must have skills in any penetration tester's arsenal. MASPT at a glance: 10 highly practical modules 4 hours of video material 1200+ interactive slides 20 Applications to practice with Leads to emapt certification
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
VMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
Parallels Cloud Server 6.0
Parallels Cloud Server 6.0 Upgrade Guide Copyright 1999-2013 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH. Vordergasse 59 CH8200 Schaffhausen Switzerland
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
ESET REMOTE ADMINISTRATOR. Migration guide
ESET REMOTE ADMINISTRATOR Migration guide ESET REMOTE ADMINISTRATOR migration guide Copyright 2012 by ESET, spol. s r.o. ESET REMOTE ADMINISTRATOR was developed by ESET, spol. s r.o. For more information
HP Personal Workstations Step-By- Step Instructions for Upgrading Windows Vista or Windows XP Systems to Windows 7
HP Personal Workstations Step-By- Step Instructions for Upgrading Windows Vista or Windows XP Systems to Windows 7 September 15, 2009 Introduction HP is committed to supporting our customer s operating
YubiKey PIV Deployment Guide
YubiKey PIV Deployment Guide Best Practices and Basic Setup YubiKey 4, YubiKey 4 Nano, YubiKey NEO, YubiKey NEO-n YubiKey PIV Deployment Guide 2016 Yubico. All rights reserved. Page 1 of 27 Copyright 2016
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
EXPLORING LINUX KERNEL: THE EASY WAY!
EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment
This Upgrade Is Only Valid For The US Cellular SCH-I500 (Mesmerize). It Is Incompatible With All Other Models. Requirements
Samsung has released a software update for the US Cellular SCH-I500 (Mesmerize) which is recommended to be installed. This software will update your Samsung SCH-I500 (Mesmerize) to Android 2.3.4 software
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
DriveLock and Windows 8
Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Using Devices. Chapter 3
Chapter 3 Using Devices es The Devices page lists all the devices you have enrolled in the Centrify identity platform and lets you send commands to the devices. Device related tasks that you can perform
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
Full System Emulation:
Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware Christopher Kruegel Lastline, Inc. [email protected] 1 Introduction Automated malware analysis systems (or sandboxes)
Mobile security, forensics & malware analysis with Santoku Linux. * Copyright 2013 viaforensics, LLC. Proprietary Information.
Mobile security, forensics & malware analysis with Santoku Linux PRESENTER - ANDREW HOOG CEO/Co-founder of viaforensics Andrew is a published author, computer scientist, and mobile security & forensics
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Fiery E100 Color Server. Welcome
Fiery E100 Color Server Welcome 2011 Electronics For Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45098226 27 June 2011 WELCOME 3 WELCOME This Welcome
Sophos Mobile Control User guide for Android. Product version: 4
Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up
Security Technology for Smartphones
Security Technology for Smartphones Yasuhiko Abe Hitoshi Ikeda Masafumi Emura Service functions are implemented on smartphones by storing on them personal information, network-operator information, corporate
Storing Encrypted Plain Text Files Using Google Android
Storing Encrypted Plain Text Files Using Google Android Abstract Jared Hatfield University of Louisville Google Android is an open source operating system that is available on a wide variety of smart phones
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
Digital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
USB 2.0 Flash Drive User Manual
USB 2.0 Flash Drive User Manual 1 INDEX Table of Contents Page 1. IMPORTANT NOTICES...3 2. PRODUCT INTRODUCTION...4 3. PRODUCT FEATURES...5 4. DRIVER INSTALLATION GUIDE...6 4.1 WINDOWS 98 / 98 SE... 6
Upgrading from Windows XP to Windows 7
Upgrading your PC from Windows XP to Windows 7 requires a custom installation which doesn't preserve your programs, files, or settings. It s sometimes called a clean installation for that reason. A custom
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Best Practice Document Hints and Tips
Marshal Ltd. Date: 02/06/2007 Marshal EndPoint Security From Best Practice Document Hints and Tips Marshal Software Ltd CSL 005 Marshal EndPoint Security Best Practice (2) Privacy Control: None Version:
Mac computer configurations & OS X optimizations (Updated: November 2012)
Mac computer configurations & OS X optimizations (Updated: November 2012) A fast processor and a good amount of memory are important, but do not necessarily guarantee that a computer will perform well
Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders
Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal
How to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
BRING YOUR OWN DEVICE
BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues
F-Secure Mobile Security for Business. Getting Started Guide
F-Secure Mobile Security for Business Getting Started Guide F-Secure Mobile Security for Business TOC 3 Contents Chapter 1: F-Secure Mobile Security Portal...5 Overview...6 Administrator access levels...6
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Android Programming and Security
Android Programming and Security Dependable and Secure Systems Andrea Saracino [email protected] Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System
McAfee SMC Installation Guide 5.7. Security Management Center
McAfee SMC Installation Guide 5.7 Security Management Center Legal Information The use of the products described in these materials is subject to the then current end-user license agreement, which can
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
TOTAL DEFENSE MOBILE SECURITY USER S GUIDE
TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Getting Started with VMware Fusion
Getting Started with VMware Fusion VMware Fusion for Mac OS X 2008 2012 EN-000933-00 2 Getting Started with VMware Fusion You can find the most up-to-date technical documentation on the VMware Web site
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2008 FOR EMBEDDED SYSTEMS, STANDARD
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2008 FOR EMBEDDED SYSTEMS, STANDARD These license terms are an agreement between you and [OEM]. Please read them. They apply to the software included
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
The Virtual Digital Forensics Lab: Expanding Law Enforcement Capabilities
Briefing Paper The Virtual Digital Forensics Lab: Expanding Law Enforcement Capabilities Sean A. Ensz University of Oklahoma 200 Felgar Street, Norman, Oklahoma 73019 405.325.3954 Office 405.325.1633 Fax
Guidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
Why NetDimensions Learning
Why NetDimensions Learning Quick To Implement Lower overall costs NetDimensions Learning can be deployed faster and with fewer implementation services than almost any other learning system in the market.
1. System Requirements
BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data
Operating Systems Overview As we have learned in working model of a computer we require a software system to control all the equipment that are
Session 07 Operating Systems Overview As we have learned in working model of a computer we require a software system to control all the equipment that are connected to computer and provide good environment
PMOD Installation on Linux Systems
User's Guide PMOD Installation on Linux Systems Version 3.7 PMOD Technologies Linux Installation The installation for all types of PMOD systems starts with the software extraction from the installation
SOS Suite Installation Guide
SOS Suite Installation Guide rev. 8/31/2010 Contents Overview Upgrading from SOS 2009 and Older Pre-Installation Recommendations Network Installations System Requirements Preparing for Installation Installing
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Tivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide
Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Note Before using this information and the product
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
VERALAB LDAP Configuration Guide
VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to
Host-based Protection for ATM's
SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................
Mobile Application Security and Penetration Testing Syllabus
Mobile Application Security and Penetration Testing Syllabus Mobile Devices Overview 1.1. Mobile Platforms 1.1.1.Android 1.1.2.iOS 1.2. Why Mobile Security 1.3. Taxonomy of Security Threats 1.3.1.OWASP
Challenges in Android Application Development: A Case Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.294
Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac
Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
IBM i Version 7.2. Security Service Tools
IBM i Version 7.2 Security Service Tools IBM i Version 7.2 Security Service Tools Note Before using this information and the product it supports, read the information in Notices on page 37. This edition
Acquisition of the Microsoft Surface RT
Acquisition of the Microsoft Surface RT Author: Darren Freestone Lock and Code Pty Ltd [email protected] Date: 7 April 2013 Revision 1.01 Contents Acquisition of the Microsoft Surface RT... 1 Step-by-Step
The "Eclipse Classic" version is recommended. Otherwise, a Java or RCP version of Eclipse is recommended.
Installing the SDK This page describes how to install the Android SDK and set up your development environment for the first time. If you encounter any problems during installation, see the Troubleshooting
PINsafe Multifactor Authentication Solution. Technical White Paper
PINsafe Multifactor Authentication Solution Technical White Paper Abstract PINsafe is a flexible authentication solution that offers a wide range of authentication models. The use of the patented one-time
BYOD Guidance: Good Technology
GOV.UK Guidance BYOD Guidance: Good Technology Published 16 March 2015 Contents 1. About this guidance 2. Summary of key risks 3. Architectural components 4. Technical assessment 5. Other considerations
APPLICATION VIRTUALIZATION TECHNOLOGIES WHITEPAPER
APPLICATION VIRTUALIZATION TECHNOLOGIES WHITEPAPER Oct 2013 INTRODUCTION TWO TECHNOLOGY CATEGORIES Application virtualization technologies can be divided into two main categories: those that require an
Installing and Upgrading to Windows 7
Installing and Upgrading to Windows 7 Before you can install Windows 7 or upgrade to it, you first need to decide which version of 7 you will use. Then, you should check the computer s hardware to make
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
Final Year Project Interim Report
2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)
