2011
DOI: 10.1016/j.diin.2011.05.003
|View full text |Cite
|
Sign up to set email alerts
|

Toward a general collection methodology for Android devices

Abstract: CollectionAcquisition a b s t r a c tThe Android platform has been deployed across a wide range of devices, predominately mobile phones, bringing unprecedented common software features to a diverse set of devices independent of carrier and manufacturer. Modern digital forensics processes differentiate collection and analysis, with collection ideally only occurring once and the subsequent analysis relying upon proper collection. After exploring special device boot modes and Android's partitioning schema we deta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
81
0
3

Year Published

2012
2012
2019
2019

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 128 publications
(84 citation statements)
references
References 8 publications
0
81
0
3
Order By: Relevance
“…Several mobile phone forensic tools have been developed for specific operating systems such as Symbian [7], Windows Mobile [4] and Android [10]. However, since these tools are operating system dependent, they cannot be used to acquire data from Shanzhai phones.…”
Section: Related Workmentioning
confidence: 99%
“…Several mobile phone forensic tools have been developed for specific operating systems such as Symbian [7], Windows Mobile [4] and Android [10]. However, since these tools are operating system dependent, they cannot be used to acquire data from Shanzhai phones.…”
Section: Related Workmentioning
confidence: 99%
“…Unlocking refers to gaining full access to the bootloader. This lets us replace the stock installation of the Android operating system on a phone with a custom version of the operating system (often referred to as a custom ROM) [45]. This will be required to disable the Touch to Beam UI as discussed in 4.4.6.…”
Section: Unlocking and Rooting The Phonementioning
confidence: 99%
“…Taking advantage of kernel vulnerabilities, attacker acquires the ability to bypass system protection mechanisms and carry out some malicious behavior, such as gain root privilege and steal personal data. Privilege escalation attack, also known as root exploit, is the process of exploiting kernel vulnerabilities to obtain the highest privilege [3]. If a process gains the root privilege, it has access permission to access any data and obtains control over the whole system.…”
Section: Introductionmentioning
confidence: 99%