Forensic Analysis of Android Mobile Devices

被引:0
|
作者
Rao, V. Venkateswara [1 ]
Chakravarthy, A. S. N. [1 ]
机构
[1] JNTU Kakinada, Dept Comp Sci & Engn, Kakinada, India
关键词
Android Forensics; Android Application Forensics; Mobile Forensics;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Android operating system (OS) gained popularity in recent days. It provides almost similar functionalities available in desktop/laptop computers. Users can create documents, browse Internet, access, read and send emails, phone calling, SMSs and MMSs, Personal planners and keeping confidential information in various forms. These android devices and applications provide flexibility and ease of use for communication, web browsing, sharing and social interaction among friends, families and various groups personally and professionally. On the other side, these devices and applications are vulnerable places to prayed cyber criminals to compromise the applications. In order to identify a sequence of activities carried out by suspected person, forensic examination of the Smartphone is necessary for many of cyber crime investigations. In this paper authors presents a forensic analysis of the android device with respect to all kinds of memory areas in the phone and also discussed the analysis of contact information, call history and exchange of chat messages including video, audio and images. The analysis results provided and facilitate an investigator to correlate the activities carried out by a person using the Smartphone with malicious intention.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Stateful usage control for android mobile devices
    [J]. 1600, Springer Verlag (8743):
  • [32] Deployment of APIs on Android Mobile Devices and Microcontrollers
    Laso, Sergio
    Linaje, Marino
    Garcia-Alonso, Jose
    Murillo, Juan M.
    Berrocal, Javier
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2020,
  • [33] Stateful Usage Control for Android Mobile Devices
    Lazouski, Aliaksandr
    Martinelli, Fabio
    Mori, Paolo
    Saracino, Andrea
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 97 - 112
  • [34] Data Security Evaluation for Mobile Android Devices
    Khokhlov, Igor
    Reznik, Leon
    [J]. PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 154 - 160
  • [35] Vulnerability in Mobile Devices with Android Operating System
    Escobar Martinez, Jorge Ivan
    Quinto Rojas, Luis Carlos
    [J]. CUADERNO ACTIVA, 2015, (07): : 55 - 65
  • [36] Detection of suspicious connections on Android mobile devices
    Costea, Dragos-Florin
    Tapus, Nicolae
    [J]. 2019 22ND INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2019, : 323 - 328
  • [37] Using Android Devices as Mobile Extensible HMIs
    Willocx, Michiel
    Vossaert, Jan
    Raes, Vincent
    Naessens, Vincent
    [J]. 2018 FIFTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, 2018, : 222 - 227
  • [38] Efficient Storage Encryption for Android Mobile Devices
    Lu, Yung-Feng
    Kuo, Chin-Fu
    Feng, Yi-Yen
    [J]. 2016 RESEARCH IN ADAPTIVE AND CONVERGENT SYSTEMS, 2016, : 213 - 218
  • [39] Forensic analysis of WeChat on Android smartphones
    Wu, Songyang
    Zhang, Yong
    Wang, Xupeng
    Xiong, Xiong
    Du, Lin
    [J]. DIGITAL INVESTIGATION, 2017, 21 : 3 - 10
  • [40] Forensic analysis of hook Android malware
    Schmutz, Dominic
    Rapp, Robin
    Fehrensen, Benjamin
    [J]. FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2024, 49