2018
DOI: 10.1016/j.diin.2018.04.013
|View full text |Cite
|
Sign up to set email alerts
|

DroidKex: Fast extraction of ephemeral TLS keys from the memory of Android apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…Saltaformaggio et al [15][16][17] and Taubmann et al [21] also developed tools which are after ephemeral data in memory, to reconstruct flows within an app's runtime which can be critical in a forensic investigation. They do so by reconstructing critical data structures from memory dumps.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Saltaformaggio et al [15][16][17] and Taubmann et al [21] also developed tools which are after ephemeral data in memory, to reconstruct flows within an app's runtime which can be critical in a forensic investigation. They do so by reconstructing critical data structures from memory dumps.…”
Section: Related Workmentioning
confidence: 99%
“…Rather than within a general concept, their ephemeral data is very specific (GUI elements for screen flows and TLS private keys respectively). DroidKex [21] acquires memory dumps upon send and receive functionality of an app, an indicator that TLS connections are being established, similar to JIT-MF's concept of trigger points.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Taubmann et al [14] utilizes a combination of both approaches outlined previously to identify TLS session keys in memory dumps of Android OS applications.…”
Section: Related Workmentioning
confidence: 99%
“…While there exist ways to get a peek [7]- [9], the inherent deficiency lies in assuming that keys are visible in memory at acquisition time. Until now, attempts to narrow on the timeliness [10], [11] or locating (or reduce the search space of) key material once the memory is obtained [7], [8], [12]- [14] have been inherently cryptosystem-or software-dependent.…”
Section: Introductionmentioning
confidence: 99%