Toward a general collection methodology for Android devices

Digital Investigation - Tập 8 - Trang S14-S24 - 2011
Timothy Vidas1, Chengye Zhang2, Nicolas Christin2
1Carnegie Mellon ECE/CyLab, USA#TAB#
2Carnegie Mellon INI/CyLab, USA

Tóm tắt

Từ khóa


Tài liệu tham khảo

Al-Zarouni M. Introduction to mobile phone flasher devices and considerations for their use in mobile phone forensics. In Proceedings of the 5th Australian digital forensics conference, Dec. 2007.

Android developers. http://developer.android.com/.

[Q] Android rooting [Archive] – xda-developers. http://forum.xda-developers.com/archive/index.php/t-866622.html.

Ayers, 2007

Backdoor and default passwords. http://www.freelabs.com/∼whitis/-security/backdoor.html.

Bader, 2010, iPhone 3GS forensics: logical analysis using apple iTunes backup utility, Small Scale Digital Device Forensics Journal, 4

Burdach, 2006

Casadei, 2006, Forensics and SIM cards: an overview, International Journal of Digital Evidence, 5

Computer forensics – forums – general discussion – mobile phone forensics – Android/root access. http://www.forensicfocus.com/index.php?name=Forums&-file=viewtopic&t=5779.

Distefano, 2008, An overall assessment of mobile internal acquisition tool, Digital Investigation, 5, S121, 10.1016/j.diin.2008.05.010

Dobell A. Heimdall website. https://github.com/Benjamin-Dobell/Heimdall.

DROID by motorola – Android phone – tech specs – motorola mobility, inc. USA. http://www.motorola.com/Consumers/US-EN/Consumer-Product-and-Services/Mobile-Phones/ci.Motorola-DROID-US-EN.alt.

Factsheet: The U.S. media universe nielsen wire. http://blog.nielsen.com/nielsenwire/online_mobile/factsheet-the-u-s-media-universe/.

Fairbanks, 2009

Farmer, 2005

Hoog, 2009, Android forensics, Mobile Forensics World, 29

Htc – developer center. http://developer.htc.com/adp.html.

Htc – products – T-Mobile g1-specification. http://www.htc.com/www/product/g1/specification.html.

Jansen, 2007, Guidelines on cell phone forensics, NIST Special Publication, 800, 101

Kim, 2007, Data acquisition from cell phone using logical approach, Proceedings of the World Academy of Science, Engineering and Technology, 26

L. Flash Software Group, Samsung Electronics Co. Linustoreii samsung onenand flash linux device driver – gpl compliance, July 2008.

Meeker, 2010

Mokhonoana, 2007

Memory technology device (mtd) subsystem for linux. http://www.linux-mtd.infradead.org/faq/nand.html.

Murphy, 2009, The fraternal clone method for CDMA cell phones, Small Scale Digital Device Forensics Journal, 3

Paul

Reisinger, 2009, Another iPhone worm, but this one is serious the digital home – CNET news, CNET News

Sarma, 2002

Shin, 2009

2009

Thing, 2010, Live memory forensics of mobile phones, Digital Investigation, 7, S74, 10.1016/j.diin.2010.05.010

Vidas, 2006, The acquisition and analysis of random access memory, Journal of Digital Forensic Practice, 1, 315, 10.1080/15567280701418171

Welcome to Android open source. http://source.android.com/.

Willassen, 2003, Forensics and the GSM mobile telephone system, International Journal of Digital Evidence, 2, 1

Williamson, 2006

Yates, 2010