Advertisement

Android Forensics

  • Xiaodong Lin
Chapter

Abstract

The objectives of this chapter are to:

References

  1. 1.
  2. 2.
    N. Scrivens, X. Lin: Android digital forensics: data, extraction and analysis. ACM TUR-C 2017: 26:1-26:10.Google Scholar
  3. 3.
    L. Zhang, F. Yu, Q. Ji: The forensic analysis of WeChat message. Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control, (2016): 500–503.Google Scholar
  4. 4.
    A. Hoog: Android forensics: investigation, analysis and mobile security for google android. Elsevier, 2011.Google Scholar
  5. 5.
    XJTAG: https://www.xjtag.com/about-jtag/what-is-jtag/ (Accessed Dec. 1st, 2016).
  6. 6.
    Z3X Easy JTAG: http://easy-jtag.com/ (Accessed Dec. 1st, 2016).
  7. 7.
    S.J. Yang, J.H. Choi, K.B. Kim, T. Chang: New acquisition method based on firmware update protocols for android smartphones, Digital Investigation. 14 (2015): S68–S76.Google Scholar
  8. 8.
  9. 9.
    N. Al Mutawa, I. Baggili, A. Marrington: Forensic analysis of social networking applications on mobile devices, Digital Investigation. 9 (2012): S24–S33.CrossRefGoogle Scholar
  10. 10.
    T. Vidas, C. Zhang, N. Christin: Toward a general collection methodology for android devices, Digital Investigation. 8 (2011). S14–S24.CrossRefGoogle Scholar
  11. 11.
    N. Son, Y. Lee, D. Kim, J.I. James, S. Lee, K. Lee: A study of user data integrity during acquisition of android devices, Digital Investigation. 10 (2013): S3–S11.CrossRefGoogle Scholar
  12. 12.
    H. Srivastava, S. Tapaswi: Logical acquisition and analysis of data from android mobile devices, Information & Computer Security. 23.5 (2015): 450–475.CrossRefGoogle Scholar
  13. 13.
    N. A. Matuwa, I. Baggili, A. Marrington: Forensic analysis of social networking applications on mobile devices. Digital Investigation, 9(2012): S24–S3.Google Scholar
  14. 14.
    A. Mahajan, M.S. Dahiya, S.P. Sanghvi: Forensics analysis of instant messenger applications on Android devices. International Journal of Computer Applications, 68(2013): 38–44.CrossRefGoogle Scholar
  15. 15.
    N. S. Thakur: Forensic analysis of WhatsApp on Android smartphones. M.Sc. thesis, University of New Oeleans, New Orleans, LA, Aug. 2013.Google Scholar
  16. 16.
    C. Anglano, M. Canonico, M. Guazzone: Forensic analysis of the ChatSecure instant messaging application on android smartphones, Digital Investigation 19 (2016): 44–59.CrossRefGoogle Scholar
  17. 17.
    D. Walnycky, I. Baggili, A. Marrington, J. Moore, F. Breitinger: Network and device forensic analysis of android social-messaging applications, Digital Investigation. 14 (2015): S77–S84.Google Scholar
  18. 18.
    C. Anglano: Forensic analysis of whatsapp messenger on android smartphones, Digital Investigation. 11 (2014): 201–213.Google Scholar
  19. 19.
    N. A. Barghuthi, H. Said: Social networks IM forensics: encryption analysis. Journal Communications, 2013;8(11).Google Scholar
  20. 20.
    F. Karpisek, I. Baggili, F. Breitinger: Whatsapp network forensics: decrypting and understanding the Whatsapp call signaling messages. Digital Investigation, 15(2015): 110–118.  https://doi.org/10.1016/j.diin.2015.09.002 special Issue: Big Data and Intelligent Data Analysis. http://www.sciencedirect.com/science/article/pii/S174228761500098.CrossRefGoogle Scholar
  21. 21.
    F. Zhou, Y. Yang, Z. Ding, G. Sun: Dump and analysis of android volatile memory on wechat. IEEE International Conference on Communications (ICC), 2015: 7151–7156.  https://doi.org/10.1109/ICC.2015.7249467.
  22. 22.
    C. Silla, Wechat forensic artifacts: Android phone extraction and analysis. Master’s thesis. Purdue University, 2015.Google Scholar
  23. 23.
    S. Wu, Y. Zhang, X. Wang, X. Xiong, L. Du: Forensic analysis of WeChat on Android smartphones. Digital Investigation, 21 (2017): 3–10.CrossRefGoogle Scholar
  24. 24.
    G. B. Satrya, P. T. Daely, and S. Y. Shin. Android forensics analysis: Private chat on social messenger. In 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN), pages 430–435, July 2016.Google Scholar
  25. 25.
    G. B. Satrya, P. T. Daely, M. A. Nugroho: Digital forensic analysis of telegram messenger, International Conference on Information, Communication Technology and System (ICTS), 2016.Google Scholar
  26. 26.

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Xiaodong Lin
    • 1
  1. 1.Department of Physics and Computer Science, Faculty of ScienceWilfrid Laurier UniversityWaterlooCanada

Personalised recommendations