Evaluating the privacy of Android mobile applications under forensic analysis
Tài liệu tham khảo
Abbott, 2012
Apostolopoulos, 2013, Discovering authentication credentials in volatile memory of Android mobile devices
Bornstein, 2008, Dalvik VM internals
Case, 2011
Consumer Survey, 2012
Girault, 2010
Hoog, 2011
http://blog.flurry.com/bid/88867/iOS-and-Android-Adoption-Explodes-Internationally [accessed on May 2013].
http://code.google.com/p/lime-forensics [retrieved on Nov. 2012].
http://developer.Android.com/tools/debugging/ddms.html [accessed on Nov. 2012].
http://developer.android.com/tools/help/adb.html [accessed on Nov. 2012].
http://developer.android.com/about/dashboards/index.html [accessed on 01.05.13].
http://mobworld.wordpress.com/2010/07/05/memory-management-in-Android/ [accessed on Nov. 2012].
http://thomascannon.net/projects/android-reversing [accessed on Oct. 2013].
http://www.forensicswiki.org/wiki/dd [accessed on Oct. 2013].
http://www.sleuthkit.org/sleuthkit/index.php [accessed on Oct. 2013].
2013
Karayianni, 2012, A framework for password harvesting from volatile memory, Int J Electron Secur Digit Forensics, 4, 154, 10.1504/IJESDF.2012.048411
Kramer S. http://c-skills.blogspot.com/2010/08/droid2.html [accessed on Oct. 2013].
Müller, 2013, Frost forensic recovery of scrambled telephones
Mylonas, 2013, Delegate the smartphone user? Security awareness in the smartphone platforms, Comput Secur, 34, 47, 10.1016/j.cose.2012.11.004
Mylonas, 2013, Assessing privacy risks in Android: a user-centric approach
Ponemon Institute LLC, 2011
Sylve, 2012, Acquisition and analysis of volatile memory from android device, Digit Investig, 8, 175, 10.1016/j.diin.2011.10.003
Thing, 2010, Live memory forensics of mobile phones
Wright, 2012