Skip to content

Forensic Analysis of Android Cryptocurrency Wallet Applications

Conference/Workshop:
Advances in Digital Forensics XIX. DigitalForensics 2023.
Journal: IFIP Advances in Information and Communication Technology,
Published: 2023
Primary Author: Chen Shi
Secondary Authors: Yong Guan
Research Area: Digital

Crypto wallet apps that integrate with various block-chains allow the users to make digital currencies transaction with QR codes. According to reports from financesonline [3], there is over 68 million crypto wallet app users in 2021. As new crypto wallets and cryptocurrencies enter the market, the number of users will continue to go up in the future. As the market rapidly growing, it also raises concerns about security risks and sensitive information leakage. In this paper, we present our forensic analysis of Android cryptocurrency apps. As the popularity of cryptocurrency has increased significantly in the past few years, more and more people using mobile apps to make crypto transactions and manage their funds, the sensitive user information stored in such mobile apps has been increasingly discovered and adopted as critical evidence for civil and criminal cases. We have collected and analyzed 253 real-world Android cryptocurrency wallet apps. Our findings are surprisingly interesting: (1) 135 crypto wallet apps store user account information in a local file system which malware could potentially gain access to; (2) 67 crypto wallet apps access and store user’s location information in a local database and log files; (12) crypto wallet apps track the last used time of other application installed on the device. Our proposed approach found that, without recovering deleted files, various types of evidence data are still able to be identified from the logging system as well as files. We compare our analysis result with prior studies and find several types of evidence that were not discovered before. Our main contribution to this research is to provide an effective forensic analysis method for Android cryptocurrency wallet apps that can extract critical evidence from the local file system as well as system logs.

Related Resources

Source Camera Identification with Multi-Camera Smartphones

Source Camera Identification with Multi-Camera Smartphones

An overview of source camera identification on multi-camera smartphones, and introduction to the new CSAFE multi-camera smartphone image database, and a summary of recent results on the iPhone 14 Pro’s.
An Anti-Fuzzing Approach for Android Apps

An Anti-Fuzzing Approach for Android Apps

One of significant mobile app forensic analysis problems is the app evidence extraction from the device. Given the fact that mobile apps could generate more than 19K files in a…
Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information

Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information

The conventional information leakage metrics assume that an adversary has complete knowledge of the distribution of the mechanism used to disclose information correlated with the sensitive attributes of a system.…
Camera Device Identification and the Effects of Underexposure

Camera Device Identification and the Effects of Underexposure

Technology today allows a photograph from a digital camera to be matched with the camera that took it. However, the matching software was created over 10 years ago using data…