Toward a general collection methodology for Android devices
Tóm tắt
Từ khóa
Tài liệu tham khảo
Al-Zarouni M. Introduction to mobile phone flasher devices and considerations for their use in mobile phone forensics. In Proceedings of the 5th Australian digital forensics conference, Dec. 2007.
Android developers. http://developer.android.com/.
[Q] Android rooting [Archive] – xda-developers. http://forum.xda-developers.com/archive/index.php/t-866622.html.
Ayers, 2007
Backdoor and default passwords. http://www.freelabs.com/∼whitis/-security/backdoor.html.
Bader, 2010, iPhone 3GS forensics: logical analysis using apple iTunes backup utility, Small Scale Digital Device Forensics Journal, 4
Burdach, 2006
Casadei, 2006, Forensics and SIM cards: an overview, International Journal of Digital Evidence, 5
Computer forensics – forums – general discussion – mobile phone forensics – Android/root access. http://www.forensicfocus.com/index.php?name=Forums&-file=viewtopic&t=5779.
Distefano, 2008, An overall assessment of mobile internal acquisition tool, Digital Investigation, 5, S121, 10.1016/j.diin.2008.05.010
Dobell A. Heimdall website. https://github.com/Benjamin-Dobell/Heimdall.
DROID by motorola – Android phone – tech specs – motorola mobility, inc. USA. http://www.motorola.com/Consumers/US-EN/Consumer-Product-and-Services/Mobile-Phones/ci.Motorola-DROID-US-EN.alt.
Factsheet: The U.S. media universe nielsen wire. http://blog.nielsen.com/nielsenwire/online_mobile/factsheet-the-u-s-media-universe/.
Fairbanks, 2009
Farmer, 2005
Hoog, 2009, Android forensics, Mobile Forensics World, 29
Htc – developer center. http://developer.htc.com/adp.html.
Htc – products – T-Mobile g1-specification. http://www.htc.com/www/product/g1/specification.html.
Jansen, 2007, Guidelines on cell phone forensics, NIST Special Publication, 800, 101
Kim, 2007, Data acquisition from cell phone using logical approach, Proceedings of the World Academy of Science, Engineering and Technology, 26
L. Flash Software Group, Samsung Electronics Co. Linustoreii samsung onenand flash linux device driver – gpl compliance, July 2008.
Meeker, 2010
Mokhonoana, 2007
Memory technology device (mtd) subsystem for linux. http://www.linux-mtd.infradead.org/faq/nand.html.
Murphy, 2009, The fraternal clone method for CDMA cell phones, Small Scale Digital Device Forensics Journal, 3
Paul
Reisinger, 2009, Another iPhone worm, but this one is serious the digital home – CNET news, CNET News
Sarma, 2002
Shin, 2009
2009
Thing, 2010, Live memory forensics of mobile phones, Digital Investigation, 7, S74, 10.1016/j.diin.2010.05.010
Vidas, 2006, The acquisition and analysis of random access memory, Journal of Digital Forensic Practice, 1, 315, 10.1080/15567280701418171
Welcome to Android open source. http://source.android.com/.
Willassen, 2003, Forensics and the GSM mobile telephone system, International Journal of Digital Evidence, 2, 1
Williamson, 2006
Yates, 2010