Student Finds 'Hacker-like' Approach to Bypass Cell Phone Security

615940.jpg

Forensic investigators face significant challenges in securing crucial data from criminals' phones. University of Amsterdam PhD candidate Aya Fukami has identified hardware vulnerabilities in phones to bypass the security of modern devices, allowing her to extract data from phones in a way that was previously not possible.

Current phones are nearly impossible to investigate without the owner's permission. Security measures are personalized, and it often requires the owner's help to retrieve usable data. Suspects will of course not be very helpful in providing access to phones, or in some cases the owner could already be deceased.

"Traditional methods of hacking or scraping data from phones still often yield only encrypted data. Researchers then face great difficulty making that encrypted data usable," Fukami says. "It's a process that also takes a long time and doesn't always result in usable evidence."

To overcome this, Fukami explored ways to bypass vulnerabilities in phone system security. And she succeeded.

"Through exploiting the security mechanism implemented in common memory systems used in popular smartphones, we could access the hidden information, which can be used to decrypt the encrypted contents," said Fukami.

Research like this is necessary, given several developments. Phones not only have much better security now, but they also have much larger memory than 10 years ago. Additionally, manufacturers' attitudes toward governments have shifted, with a 2015 case between the FBI and Apple marking a critical turning point. In this case, Apple refused to give the FBI access to bypass iPhone security systems despite multiple requests. In the end, the FBI succeeded in breaking into the case phone with the help of a third-party. Therefore, the court case was dropped at the last minute.

"However, this case sparked a worldwide discussion about privacy against national security," said Fukami.

According to Fukami, cases like these highlight that investigators often lag behind criminals, especially in a world where product technology is advancing rapidly. She advocates for proactive research in forensic science on security systems. What is a breakthrough now will be outdated in a year, so it's important to keep thinking about countermeasures can be put in place. 

"Forensic science has traditionally focused on retrieving raw data from phones," said Fukami. "I believe a hacker-like approach is beneficial in these situations. Data from phones is playing an increasingly important role in the courtroom. With these kinds of proactive approaches, we ensure that crucial evidence from a phone can more often be effectively used as evidence."

Republished courtesy of UVA



Subscribe to our e-Newsletters
Stay up to date with the latest news, articles, and products for the lab. Plus, get special offers from Forensic – all delivered right to your inbox! Sign up now!

More News

  • Skeletal Remains Identified After More Than 20 Years

    More than 20 years after the fully skeletonized remains of a man were found in a wooded area of Southwest Portland, the remains have been positively identified as Robert Lee Horton, who would have been 47 years old at the time of his death.
  • Police Seek Tips on Identity of 2001 John Doe

    He is of Central American ancestry, with his parents likely being from El Salvador or Guatemala.
  • Forensic DNA: Then and Now

    When Marie Allen began studying molecular biology in Uppsala, forensic DNA analysis was still a young research field. Today, nearly forty years later, she leads the development of methods that make it possible to analyse DNA where others see nothing.
  • DNA, Genealogy Names Suspect in 1989 Kidnapping, Rape of 7-Year-Old

    On Nov. 20, 1989, a 7-year-old victim was approached by an adult male who lured her to his vehicle, abducted her, and, over the course of the next few hours, sexually battered her.