Android anti-forensics through a local paradigm

被引:26
|
作者
Distefano, Alessandro [1 ]
Me, Gianluigi [1 ]
Pace, Francesco [2 ]
机构
[1] Univ Roma Tor Vergata, Comp Sci Syst & Prod Dept, I-00133 Rome, Italy
[2] CNR, IAC, Rome, Italy
关键词
Android; Anti-Forensics; Mobile Devices; Evidence;
D O I
10.1016/j.diin.2010.05.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices are among the most disruptive technologies of the last years, gaining even more diffusion and success in the daily life of a wide range of people categories. Unfortunately, while the number of mobile devices implicated in crime activities is relevant and growing, the capability to perform the forensic analysis of such devices is limited both by technological and methodological problems. In this paper, we focus on Anti-Forensic techniques applied to mobile devices, presenting some fully automated instances of such techniques to Android devices. Furthermore, we tested the effectiveness of such techniques versus both the cursory examination of the device and some acquisition tools. (C) 2010 Digital Forensic Research Workshop. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:S83 / S94
页数:12
相关论文
共 50 条
  • [1] Android Anti-forensics: Modifying CyanogenMod
    Karlsson, Karl-Johan
    Glisson, William Bradley
    [J]. 2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4828 - 4837
  • [2] Analysis of VMware Virtual Machine in Forensics and Anti-Forensics Paradigm
    Riaz, Hammad
    Tahir, Mohammad Ashraf
    [J]. 2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 330 - 335
  • [3] A tour through the realm of anti-forensics
    Forte, Dario
    Power, Richard
    [J]. Computer Fraud and Security, 2007, 2007 (06): : 18 - 20
  • [4] An Anti-forensics Method against Memory Acquiring for Android Devices
    Zheng, Jiamin
    Tan, Yu-An
    Zhang, Xiaosong
    Liang, Chen
    Zhang, Changyou
    Zheng, Jun
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 214 - 218
  • [5] Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem
    Harris, Ryan
    [J]. DIGITAL INVESTIGATION, 2006, : S44 - S49
  • [6] COUNTERING JPEG ANTI-FORENSICS
    Valenzise, G.
    Nobile, V.
    Tagliasacchi, M.
    Tubaro, S.
    [J]. 2011 18TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2011,
  • [7] ANTI-FORENSICS OF JPEG COMPRESSION
    Stamm, Matthew C.
    Tjoa, Steven K.
    Lin, W. Sabrina
    Liu, K. J. Ray
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, : 1694 - 1697
  • [8] Anti-Forensics of Chromatic Aberration
    Mayer, Owen
    Stamm, Matthew C.
    [J]. MEDIA WATERMARKING, SECURITY, AND FORENSICS 2015, 2015, 9409
  • [9] ANTI-Forensics - distorting the evidence
    Sartin, Bryan
    [J]. Computer Fraud and Security, 2006, 2006 (05): : 4 - 6
  • [10] A Survey On Anti-Forensics Techniques
    Gul, Murat
    Kugu, Emin
    [J]. 2017 INTERNATIONAL ARTIFICIAL INTELLIGENCE AND DATA PROCESSING SYMPOSIUM (IDAP), 2017,