Please use this identifier to cite or link to this item:
Title: Using infrastructure-based agents to enhance forensic logging of third-party applications
Authors: Bellizzi, Jennifer
Vella, Mark
Colombo, Christian
Hernandez-Castro, Julio
Keywords: Application software
Remote sensing
Computer communication systems
Android (Electronic resource)
Operating systems (Computers) -- Security measures
Mobile computing -- Security measures
Smartphones -- Security measures
Issue Date: 2023
Citation: Bellizzi, J., Vella, M., Colombo, C., & Hernandez-Castro, J. C. (2023). Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications. 9th International Conference on Information Systems Security and Privacy (ICISSP), Lisbon. 389-401.
Abstract: Logs are the primary data source forensic analysts use to diagnose and investigate attacks on deployed applications. Since the default logs may not include all application events required during an investigation, application-specific forensic logging agents are used to forensically enhance third-party applications postdeployment and ensure that any critical events are logged. However, developing such application-specific agents is impractical as this relies on application-specific knowledge requiring significant code comprehension efforts. Furthermore, the resulting forensic logging agents are likely to break compatibility between application versions and across applications; thus, requiring the time-consuming process of agent re-development much more frequently. We propose a more practical approach to developing forensic logging agents that leverages commonly-used underlying infrastructure, which is more stable across application versions and common across different applications. We evaluate our approach in the context of enhanced logging of Android messaging apps. Our results show that this approach can be used to develop logging agents that work across multiple apps while preserving the accuracy of the logs generated, thus mitigating the challenges associated with forensically enhancing third-party applications.
Appears in Collections:Scholarly Works - FacICTCS

Files in This Item:
File Description SizeFormat 
  Restricted Access
294.19 kBAdobe PDFView/Open Request a copy

Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.