Physical Forensic Acquisition and Pattern Unlock on Android Smart Phones

  • Yuan-Chi Tsai
  • Chung-Huang Yang
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 235)


Since the Android operating system was released by Google in 2007, it has developed to the top smart phone sales around the world. Meanwhile, Android has also designed many measures of security protection for the users, and the pattern lock is one of the most popular ways on Android smart phones. However, this kind of function may be seen as a protection way to criminals. Therefore, there comes the need of physical acquisition and unlocking the pattern lock on Android devices for digital forensics. This research is based on the process of mobile forensics provided by National Institute of Standards and Technology, which is designed for physical acquisition, images making and pattern unlock when the Android smart phones are under the pattern lock. The evidence and images can be analyzed through computers and it can increase the capability of restoring the deleted data, and the unlocked mobile can be used to do logical acquisition.


Smart phone Mobile forensics Android Digital evidence Pattern lock 


  1. 1.
  2. 2.
    Jansen W, Ayers R (2007) Guidelines on cell phone forensics. National Institute of Standards and Technology, USAGoogle Scholar
  3. 3.
    Jansen W, Ayers R (2005) An overview and June analysis of PDA forensic tools. Digit Investig 2(2):120–132CrossRefGoogle Scholar
  4. 4.
    NIST (2010) Smart phone tool specification version 1.1., Taiwan
  5. 5.
    Wang SJ, Ke YH, ICCL- Information Cryptology & Construction Lab (2007) Computer forensics and digital evidence: information security technology, technology crime prevention, identification and scene reconstruction. DrMaster Press Co., Ltd., Taipei, TaiwanGoogle Scholar
  6. 6.
    Wang SJ, Lin CH, ICCL Information Cryptology & Construction Lab (2009) Security and forensics of digital technology: high-tech crime prevention and digital evidence gathering, DrMaster Press Co., Ltd., TaipeiGoogle Scholar
  7. 7. Sep 2012
  8. 8.
    Android Open Source Project (2012)
  9. 9.
    Aviv AJ, Gibson K, Mossop E, Blaze M, Smith JM (2010) Smudge attacks on Smartphone touch screens. In: Proceedings of the 4th USENIX workshop on offensive technologies (WOOT)Google Scholar
  10. 10.
    Thing VLL, Ng KY, Chang EC (2010) Live memory forensics of mobile phones. Digit Investig 7(Supplement 1):S74–S82CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Graduate Institute of Information and Computer EducationNational Kaohsiung Normal UniversityKaohsiungTaiwan

Personalised recommendations