Exploring Runtime Evolution in Android: A Cross-Version Analysis and Its Implications for Memory Forensics
By: Babangida Bappah , Lauren G Bristol , Lamine Noureddine and more
Userland memory forensics has become a critical component of smartphone investigations and incident response, enabling the recovery of volatile evidence such as deleted messages from end-to-end encrypted apps and cryptocurrency transactions. However, these forensics tools, particularly on Android, face significant challenges in adapting to different versions and maintaining reliability over time due to the constant evolution of low-level structures critical for evidence recovery and reconstruction. Structural changes, ranging from simple offset modifications to complete architectural redesigns, pose substantial maintenance and adaptability issues for forensic tools that rely on precise structure interpretation. Thus, this paper presents the first systematic study of Android Runtime (ART) structural evolution and its implications for memory forensics. We conduct an empirical analysis of critical Android runtime structures, examining their evolution across six versions for four different architectures. Our findings reveal that over 73.2% of structure members underwent positional changes, significantly affecting the adaptability and reliability of memory forensic tools. Further analysis of core components such as Runtime, Thread, and Heap structures highlights distinct evolution patterns and their impact on critical forensic operations, including thread state enumeration, memory mapping, and object reconstruction. These results demonstrate that traditional approaches relying on static structure definitions and symbol-based methods, while historically reliable, are increasingly unsustainable on their own. We recommend that memory forensic tools in general and Android in particular evolve toward hybrid approaches that retain the validation strength of symbolic methods while integrating automated structure inference, version-aware parsing, and redundant analysis strategies.
Similar Papers
Assessing the Capability of Android Dynamic Analysis Tools to Combat Anti-Runtime Analysis Techniques
Software Engineering
Helps catch bad apps that hide from security tools.
Feature-Centric Approaches to Android Malware Analysis: A Survey
Cryptography and Security
Finds phone viruses attacking smart home devices.
ThreatIntel-Andro: Expert-Verified Benchmarking for Robust Android Malware Research
Cryptography and Security
Finds bad phone apps to protect computers.