Publication
FORENSIC ANALYSIS OF THE GARMIN CONNECT ANDROID APPLICATION
datacite.subject.fos | Engenharia e Tecnologia::Engenharia Eletrotécnica, Eletrónica e Informática | pt_PT |
dc.contributor.advisor | Frade, Miguel Monteiro de Sousa | |
dc.contributor.advisor | Domingues, Patrício Rodrigues | |
dc.contributor.author | Nunes, Fabian Pereira | |
dc.date.accessioned | 2024-01-12T14:24:31Z | |
dc.date.available | 2024-01-12T14:24:31Z | |
dc.date.issued | 2023-10-06 | |
dc.description.abstract | Wearable smart devices are becoming more prevalent in our lives. These tiny devices read various health signals such as heart rate and pulse and also serve as companion devices that store sports activities and even their coordinates. This data is typically sent to the smartphone via a companion application installed. These applications hold a high forensic value because of the users’ private information they store. They can be crucial in a criminal investigation to understand what happened or where that person was during a given period. They also need to guarantee that the data is secure and that the application is not vulnerable to any attack that can lead to data leaks. The present work aims to do a complete forensic analysis of the companion application Garmin Connect for Android devices. We used a Garmin Smartband to generate data and test the application with a rooted Android device. This analysis is split into two parts. The first part will be a traditional Post Mortem analysis where we will present the application, data generation process, acquisition process, tools, and methodologies. Lastly, we analyzed the data extracted and studied what can be considered a forensic artifact. In the second part of this analysis, we performed a dynamic analysis. We used various offensive security techniques and methods to find vulnerabilities in the application code and network protocol to obtain data in transit. Besides completing the Garmin Connect application analysis, we contributed various modules and new features for the tool Android Logs Events And Protobuf Parser (ALEAPP) to help forensic practitioners analyze the application and to improve the open-source digital forensics landscape. We also used this analysis as a blueprint to explore six other fitness applications that can receive data from Garmin Connect. With this work, we could conclude that Garmin Connect stores a large quantity of private data in its device, making it of great importance in case of a forensic investigation. We also studied its robustness and could conclude that the application is not vulnerable to the tested scenarios. Nevertheless, we found a weakness in their communication methods that lets us obtain any data from the user even if it was not stored in the device. This fact increased its forensic importance even more. | pt_PT |
dc.identifier.tid | 203463633 | pt_PT |
dc.identifier.uri | http://hdl.handle.net/10400.8/9262 | |
dc.language.iso | eng | pt_PT |
dc.subject | Análise forense digital | pt_PT |
dc.subject | Companion Garmin Connet x Smartphone | pt_PT |
dc.subject | Smart Band | pt_PT |
dc.subject | Android | pt_PT |
dc.subject | Informática forense | pt_PT |
dc.subject | Segurança da informação | pt_PT |
dc.subject | Cibersegurança | pt_PT |
dc.title | FORENSIC ANALYSIS OF THE GARMIN CONNECT ANDROID APPLICATION | pt_PT |
dc.type | master thesis | |
dspace.entity.type | Publication | |
rcaap.rights | openAccess | pt_PT |
rcaap.type | masterThesis | pt_PT |
thesis.degree.name | Mestrado em Cibersegurança e Informática Forense | pt_PT |