Advertisement

Physical Data Acquisition from Virtual Android Phone Using Genymotion

  • Sumit Sah
  • Animesh Kumar Agrawal
  • Pallavi KhatriEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 39)

Abstract

With the large scale proliferation of mobile technology and smart phones, there has been an exponential rise in the cases of digital frauds and cybercrimes. With smart phones becoming powerful day by day with enhanced security features, smart phone forensics has become very important for every organisation. But the expensive forensic tools are a big impediment which leads to a no of crimes going undetected. Towards this there is a need to undertake mobile forensics without the use of commercial software’s. This paper proposes manual data extraction technique using virtual phones created in an emulator (Genymotion) for android OS. Deleted data recovery using physical acquisition is done with the help of open source tool Autopsy and then a comparative analysis is done using another forensic tool Foremost.

Keywords

Information security Android forensic Genymotion Virtual android device Autopsy Foremost Mobile forensic 

References

  1. 1.
  2. 2.
  3. 3.
    Induruwa, A.: Mobile phone forensics: an overview of technical and legal aspects. Int. J. Electron. Secur. Digit. Forensics 2(2), 169 (2009)CrossRefGoogle Scholar
  4. 4.
    New ACPO guide for forensics: Computer fraud and security, vol. 2007, no. 7, p. 20 (2007)Google Scholar
  5. 5.
    Mellars, B.: Forensic examination of mobile phones. Digit. Investig. 1(4), 266–272 (2004)CrossRefGoogle Scholar
  6. 6.
    Lessard, J., Kessler, G.: Android forensics: simplifying cell phone examinations (2010)Google Scholar
  7. 7.
    Vidas, T., Zhang, C., Christin, N.: Toward a general collection methodology for android devices. Digit. Investig. 8, S14–S24 (2011)CrossRefGoogle Scholar
  8. 8.
    Sylve, J., Case, A., Marziale, L., Richard, G.G.: Acquisition and analysis of volatile memory from android devices. Digit. Investig. 8(4), 175–184 (2012)CrossRefGoogle Scholar
  9. 9.
    Srivastava, H., Tapaswi, S.: Logical acquisition and analysis of data from Android mobile devices. Inform. Comput. Secur. 23(5), 450–475 (2015)CrossRefGoogle Scholar
  10. 10.
    Hogg, A.: Android mobile forensicGoogle Scholar
  11. 11.
    Guido, M., Buttner, J., Grover, J.: Rapid differential forensic imaging of mobile devices. Digit. Investig. 18, S46–S54 (2016)CrossRefGoogle Scholar
  12. 12.
    Li, Z., Xi, B., Wu, S.: Digital forensics and analysis for android devices, computer science and education (ICCSE). In: 2016 11th International Conference on IEEE, pp. 496–500 (2016)Google Scholar
  13. 13.
    Sathe, S.C., Dongre, N.M.: Data acquisition techniques in mobile forensics. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC) (2018)Google Scholar
  14. 14.
    Raji, M., Wimmer, H., Haddad, R.J.: Analysing data from an android smartphone while comparing between two forensic tools. In: SoutheastCon 2018 (2018)Google Scholar
  15. 15.
    Agrawal, V., Tapaswi, S.: Forensic analysis of Google Allo messenger on Android platform. Inform. Comput. Secur. 27(1), 62–80 (2019)CrossRefGoogle Scholar
  16. 16.
    Ayers, R.P., Brothers, S., Jansen, W., Materese, R.: Guidelines on mobile device forensics (2016). www.nist.gov/node/5634

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Sumit Sah
    • 1
  • Animesh Kumar Agrawal
    • 1
  • Pallavi Khatri
    • 1
    Email author
  1. 1.Department of CSEITM UniversityGwaliorIndia

Personalised recommendations