2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE) 2016
DOI: 10.1109/icraie.2016.7939540
|View full text |Cite
|
Sign up to set email alerts
|

Forensic analysis of android mobile devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…The backup contains all the information related to these apps even after uninstallation. In [51], Facebook , WhatsApp, Hike, Viber, and Imo were analyzed on an Android phone. Loca-tions of artifacts were discussed in this research.…”
Section: Related Work: Application Forensicsmentioning
confidence: 99%
“…The backup contains all the information related to these apps even after uninstallation. In [51], Facebook , WhatsApp, Hike, Viber, and Imo were analyzed on an Android phone. Loca-tions of artifacts were discussed in this research.…”
Section: Related Work: Application Forensicsmentioning
confidence: 99%
“…The Android OS was developed by the Open Handset Alliance (OHA), leveraging on the Linux kernel for its core and mounting blocks of this operating system. According to Rao & Chakravarthy (2016), the android OS is characterized by having a Dalvik virtual Machine (VM). This virtual machines allows the mobile phone that is running the android OS to be able to run several applications and processes, however, as this run is processed by a unique id, the applications and processes do not interact with each other, only if special permissions and configurations are assigned to these applications.…”
Section: The Mobile Phone's Archaeology and Mobile Forensics Available Applicationsmentioning
confidence: 99%
“…Likewise, Rao & Chakravarthy (2016) denote that as for acquisition and examination of mobile data specially, message applications like WhatsApp, the digital investigator may leverage on the usage of UFED (Universal Forensic Extraction Device) and the analysis of the evidences that comes from these using the UFED Physical Analyzer. Likewise, the Cellebrite's UEFD Touch application is able to perform the acquisition of data from a mobile phone in the very different levels of extractions, including the physical one, that refers to the creation of an exact copy of the memory of the mobile phone, supporting also the file system extraction (Bjornson & Hunter, 2016).…”
Section: The Mobile Phone's Archaeology and Mobile Forensics Available Applicationsmentioning
confidence: 99%
See 1 more Smart Citation