A Novel Android Memory Forensics for Discovering Remnant Data
How to cite (IJASEIT) :
Statcounter. (2019) Mobile Operating System Market Share Worldwide. [Online]. Available: http://gs.statcounter.com/os-market-share/mobile/worldwide.
Google Drive. (2019) Google Drive Terms of Service. [Online]. Available: https://www.google.com/drive/terms-of-service/.
Holt, Thomas J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar. Cybercrime and digital forensics: An introduction. Routledge, 2017.
Caviglione, Luca, Steffen Wendzel, and Wojciech Mazurczyk. "The future of digital forensics: Challenges and the road ahead," IEEE Security & Privacy, vol. 15, issue 6, pp. 12-17, 2017.
Ogazi-Onyemaechi, Bernard Chukwuemeka, Ali Dehghantanha, and K-KR Choo. "Performance of android forensics data recovery tools," Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, Syngress, pp. 91-110, 2017.
Lin, Xiaodong. "Android Forensics." Introductory Computer Forensics. Springer, Cham, pp. 335-371, 2018.
Nisioti, Antonia, et al. "You can run but you cannot hide from memory: Extracting IM evidence of Android apps," 2017 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2017.
Satrya, Gandeva Bayu, and Soo Young Shin. "Proposed Method for Mobile Forensics Investigation Analysis of Remnant Data on Google Drive Client," Journal of Internet Technology, vol. 19, issue 6, pp. 1741-1751, 2018.
McKemmish, Rodney. What is forensic computing? Canberra: Australian Institute of Criminology, 1999.
í…rnes, Andrí©, ed. Digital forensics. John Wiley & Sons, 2017.
Scrivens, Nathan, and Xiaodong Lin. "Android digital forensics: data, extraction and analysis." Proceedings of the ACM Turing 50th Celebration Conference, China, 2017, pp. 1-10.
Gandeva Bayu Satrya, A. Ahmad Nasrullah, and Soo Young Shin. “Identifying artefact on Microsoft OneDrive client to support Android forensics”, International Journal of Electronic Security and Digital Forensics, vol 9, issue 3, 269-291, 2017.
Sylve, Joseph T. "Towards real-time volatile memory forensics: frameworks, methods, and analysis." Dissertation Thesis. University of New Orleans, 2017.
C. Tien, J. Liao, S. Chang and S. Kuo, "Memory forensics using virtual machine introspection for Malware analysis," 2017 IEEE Conference on Dependable and Secure Computing, Taipei, 2017, pp. 518-519.
Park, Juhyun, Yun-Hwan Jang, and Yongsu Park. "New flash memory acquisition methods based on firmware update protocols for LG Android smartphones," Digital Investigation, vol. 25, pp. 42-54, 2018.
Cheng, Yingxin, et al. "A lightweight live memory forensic approach based on hardware virtualization," Information Sciences, vol. 379, pp. 23-41, 2017.
Casey, Peter, et al. "Inception: Virtual Space in Memory Space in Real Space-Memory Forensics of Immersive Virtual Reality with the HTC Vive," Digital Investigation, vol. 29, pp. S13-S21, 2019.
Vella, Mark, and Rachel Cilia. "Memory Forensics of Insecure Android Inter-app Communications." ICISSP, Porto, 2017, pp.481-486.
Yang, Seung Jei, et al. "Live acquisition of main memory data from Android smartphones and smartwatches," Digital Investigation, vol. 23, pp. 50-62, 2017.
Ali-Gombe, Aisha, et al. "DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction." 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Beijing, 2019, pp. 547-559.
P. Feng, Q. Li, P. Zhang and Z. Chen, "Private Data Acquisition Method Based on System-Level Data Migration and Volatile Memory Forensics for Android Applications," in IEEE Access, vol. 7, pp. 16695-16703, 2019.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).