Evaluating the privacy of Android mobile applications under forensic analysis

Computers & Security - Tập 42 - Trang 66-76 - 2014
Christoforos Ntantogian1, Dimitris Apostolopoulos1, Giannis Marinakis1, Christos Xenakis1
1Department of Digital Systems, University of Piraeus, Piraeus, Greece

Tài liệu tham khảo

Abbott, 2012 Apostolopoulos, 2013, Discovering authentication credentials in volatile memory of Android mobile devices Bornstein, 2008, Dalvik VM internals Case, 2011 Consumer Survey, 2012 Girault, 2010 Hoog, 2011 http://blog.flurry.com/bid/88867/iOS-and-Android-Adoption-Explodes-Internationally [accessed on May 2013]. http://code.google.com/p/lime-forensics [retrieved on Nov. 2012]. http://developer.Android.com/tools/debugging/ddms.html [accessed on Nov. 2012]. http://developer.android.com/tools/help/adb.html [accessed on Nov. 2012]. http://developer.android.com/about/dashboards/index.html [accessed on 01.05.13]. http://mobworld.wordpress.com/2010/07/05/memory-management-in-Android/ [accessed on Nov. 2012]. http://thomascannon.net/projects/android-reversing [accessed on Oct. 2013]. http://www.forensicswiki.org/wiki/dd [accessed on Oct. 2013]. http://www.sleuthkit.org/sleuthkit/index.php [accessed on Oct. 2013]. 2013 Karayianni, 2012, A framework for password harvesting from volatile memory, Int J Electron Secur Digit Forensics, 4, 154, 10.1504/IJESDF.2012.048411 Kramer S. http://c-skills.blogspot.com/2010/08/droid2.html [accessed on Oct. 2013]. Müller, 2013, Frost forensic recovery of scrambled telephones Mylonas, 2013, Delegate the smartphone user? Security awareness in the smartphone platforms, Comput Secur, 34, 47, 10.1016/j.cose.2012.11.004 Mylonas, 2013, Assessing privacy risks in Android: a user-centric approach Ponemon Institute LLC, 2011 Sylve, 2012, Acquisition and analysis of volatile memory from android device, Digit Investig, 8, 175, 10.1016/j.diin.2011.10.003 Thing, 2010, Live memory forensics of mobile phones Wright, 2012