CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Survey on Android Forensic Tools and Methodologies

by Venkateswara Rao V., A. S. N. Chakravarthy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 154 - Number 8
Year of Publication: 2016
Authors: Venkateswara Rao V., A. S. N. Chakravarthy
10.5120/ijca2016912182

Venkateswara Rao V., A. S. N. Chakravarthy . Survey on Android Forensic Tools and Methodologies. International Journal of Computer Applications. 154, 8 ( Nov 2016), 17-21. DOI=10.5120/ijca2016912182

@article{ 10.5120/ijca2016912182,
author = { Venkateswara Rao V., A. S. N. Chakravarthy },
title = { Survey on Android Forensic Tools and Methodologies },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 154 },
number = { 8 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume154/number8/26510-2016912182/ },
doi = { 10.5120/ijca2016912182 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:59:41.172594+05:30
%A Venkateswara Rao V.
%A A. S. N. Chakravarthy
%T Survey on Android Forensic Tools and Methodologies
%J International Journal of Computer Applications
%@ 0975-8887
%V 154
%N 8
%P 17-21
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent days, Android Operating System has gained top most position in mobile Operating System (OS) market share. Usage of Smartphone and tablet devices is massively increased and major portion of these devices are come up with android OS. There is a big chance that these devices may be used in committing crimes also. While doing forensic investigation of the digital devices which are involved in the crime needs special tools and techniques to seize, acquire and analysis of the android devices. This paper highlights various techniques available in the market in terms of logical acquisition, physical acquisition and analysis.

References
  1. Jeff Lessard and Gary Kessler, “Android Forensics: Simplifying Cell Phone Examinations”, Small Scale Digital Device Forensics Journal Vol. 4, No.1, ISSN# 1941-6164, September 2010.
  2. Timothy Vidas, Chengye Zhang, Nicolas Christin, “Toward a general collection methodology for Android devices”, 2011.
  3. Andre Morum de L. Simao, Fabio CausSicoli, LaertePeotta de Melo, “Acquisition of Digital Evidence in Android Smartphone”, 2011.
  4. Joe Sylve a, Andrew Case b, Lodovico Marziale b and Golden G. Richard, “Acquisition and analysis of volatile memory from android devices”, Digital Investigation 8, 175–184, 2012.
  5. Cosimo Anglano,”Forensic analysis of WhatsApp Messenger on Android Smartphones”, Digital Investigation, 1–13, 2014.
  6. Aditya Mahajan, Dahiya and Sanghvi, “Forensic Analysis of Instant Messenger Applications on Android Devices”, International Journal of Computer Applications (0975 – 8887), Volume 68– No.8, April 2013.
  7. Mohammad Iftekhar Husain, Ramalingam Sridhar, “Forensic Analysis of Instant Messaging on Smart Phones”, 2010.
  8. Noora Al Mutawa, Ibrahim Baggili and Andrew Marrington, “Forensic analysis of social networking applications on mobile devices”, Digital Investigation 9, S24–S33, 2012.
  9. Alfred Kobsa, Sameer Patil, Bertolt Meyer, “Privacy in Instant Messaging: An Impression Management Model”, 2012.
  10. Andri P Heriyanto,”Procedures and Tools for Acquisition and Analysis of Volatile Memory on Android smartphones”.
  11. Nedaa Al Barghouthy, Andrew Marrington and Ibrahim Baggili, “The Forensic Investigation of Android Private Browsing Sessions using Orweb”, 5th International conference on Computer Science and Information Technology(CSIT), 2013.
  12. Juanru Li, DawuGu and Yuhao Luo, “Android Malware Forensics: Reconstruction of Malicious Events”, 32nd International Conference on Distributed Computing Systems Workshops, 2012.
  13. Howard Chivers, “Private browsing: A window of forensic opportunity”, Digital Investigation 11, 20–29, 2014.
  14. KiavashSatvat, Matthew Forshaw, Feng Hao and Ehsan Toreini, “On the privacy of private browsing e A forensic approach”, Journal of information security and applications, 1-1 3, 2014.
  15. Vaibhav Rastogi, Yan Chen, and XuxianJiang,”Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks”, IEEE Transactions On Information Forensics And Security, VOL. 9, NO. 1, 99, January 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cyber forensics android forensics mobile forensics forensics techniques Smartphone’s