Repository logo
 
Publication

FORENSIC ANALYSIS OF THE GARMIN CONNECT ANDROID APPLICATION

datacite.subject.fosEngenharia e Tecnologia::Engenharia Eletrotécnica, Eletrónica e Informáticapt_PT
dc.contributor.advisorFrade, Miguel Monteiro de Sousa
dc.contributor.advisorDomingues, Patrício Rodrigues
dc.contributor.authorNunes, Fabian Pereira
dc.date.accessioned2024-01-12T14:24:31Z
dc.date.available2024-01-12T14:24:31Z
dc.date.issued2023-10-06
dc.description.abstractWearable smart devices are becoming more prevalent in our lives. These tiny devices read various health signals such as heart rate and pulse and also serve as companion devices that store sports activities and even their coordinates. This data is typically sent to the smartphone via a companion application installed. These applications hold a high forensic value because of the users’ private information they store. They can be crucial in a criminal investigation to understand what happened or where that person was during a given period. They also need to guarantee that the data is secure and that the application is not vulnerable to any attack that can lead to data leaks. The present work aims to do a complete forensic analysis of the companion application Garmin Connect for Android devices. We used a Garmin Smartband to generate data and test the application with a rooted Android device. This analysis is split into two parts. The first part will be a traditional Post Mortem analysis where we will present the application, data generation process, acquisition process, tools, and methodologies. Lastly, we analyzed the data extracted and studied what can be considered a forensic artifact. In the second part of this analysis, we performed a dynamic analysis. We used various offensive security techniques and methods to find vulnerabilities in the application code and network protocol to obtain data in transit. Besides completing the Garmin Connect application analysis, we contributed various modules and new features for the tool Android Logs Events And Protobuf Parser (ALEAPP) to help forensic practitioners analyze the application and to improve the open-source digital forensics landscape. We also used this analysis as a blueprint to explore six other fitness applications that can receive data from Garmin Connect. With this work, we could conclude that Garmin Connect stores a large quantity of private data in its device, making it of great importance in case of a forensic investigation. We also studied its robustness and could conclude that the application is not vulnerable to the tested scenarios. Nevertheless, we found a weakness in their communication methods that lets us obtain any data from the user even if it was not stored in the device. This fact increased its forensic importance even more.pt_PT
dc.identifier.tid203463633pt_PT
dc.identifier.urihttp://hdl.handle.net/10400.8/9262
dc.language.isoengpt_PT
dc.subjectAnálise forense digitalpt_PT
dc.subjectCompanion Garmin Connet x Smartphonept_PT
dc.subjectSmart Bandpt_PT
dc.subjectAndroidpt_PT
dc.subjectInformática forensept_PT
dc.subjectSegurança da informaçãopt_PT
dc.subjectCibersegurançapt_PT
dc.titleFORENSIC ANALYSIS OF THE GARMIN CONNECT ANDROID APPLICATIONpt_PT
dc.typemaster thesis
dspace.entity.typePublication
rcaap.rightsopenAccesspt_PT
rcaap.typemasterThesispt_PT
thesis.degree.nameMestrado em Cibersegurança e Informática Forensept_PT

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Masther_Thesis_Signed.pdf
Size:
6.6 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.32 KB
Format:
Item-specific license agreed upon to submission
Description: