SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 15-19
www.iosrjournals.org
DOI: 10.9790/0661-17211519 www.iosrjournals.org 15 | Page
A Survey on Mobile Forensic for Android Smartphones
1
Abdalazim Abdallah Mohammed Alamin, 2
Dr.Amin Babiker A/Nabi Mustafa
12
,Department of Communications, Faculty of Engineering, Al-Neelain University
Khartoum, Sudan
Abstract: Mobile forensic is fast becoming an abbreviated term that describes the process of applying digital
forensics in mobile phones world. The rapid development in mobile phones industry has led to the emergence of
the so-called smart phones which have become nearly the same as computers. Android Smartphones refer to all
types of smartphones that use Android operating system. This paper aims to survey the tools and techniques that
are used to forensically investigate Android mobile and then provides comparison between the tools according
to their roles in the investigation process. Finally, the paper gives recommendation for following the best
practices for investigating Android smartphones.
I. Introduction
Digital forensics is an interesting fast-paced field that can have a powerful impact on a wide range of
situations such as internal corporate investigations, civil litigation, criminal investigations, intelligence
gathering, and issues such as national security. As has been defined by National Security Database (NSD),
digital forensics is a branch of forensic science including the retrieval and investigation of material found in
digital devices, often related to computer crime.[1]
Originally the term was used to exclusively describe the process of forensic investigation of crimes that
takes place in computers „network or the computer has been used as a weapon to conduct the criminal activities,
but now the term is widely used to define all types of crimes where any type of digital devices is a subject or an
object in the crime scene.[1, 2]
Regardless the type of digital device, the process of forensically investigating such type of devices
involves data acquisition which refers to cloning the data from the device to an external source, analysis of the
data using analytical tools to classify the data groups and recover information from the data source and finally
highlighting the interesting findings that would be potentially evidence for proving the criminal activities.[3]
A digital device could be a computer, a mobile phone, a tablet device or any type of electronic devices.
So now, digital forensics as a science is encompassing many sub-disciplines such as computer
forensics, Mobile forensic and network forensic. The scope of this paper is to focus on mobile forensics.
Mobile device forensic, cellular phone forensic or mobile forensics are all synonyms to the same term
which refers to the branch of digital forensics that concern with recovering of digital evidence or data from a
mobile device under forensically sound conditions.
Mobile forensics, arguably the fastest growing and evolving digital forensics discipline and this is
according to the rapid growth in mobile phone industry and it offers significant opportunities as well as many
challenges.
One of the most significant break throughs in the development of mobile phone industry is the
emergence of what is known today as smartphones.Unlike traditional mobile phones, smart phones are bundled
with a complete operating system and many other applications that help users to interact with many data and
voice services.
According to (Android forensic), the Android mobile platform has quickly risen from its first phone in
October 2008 to the most popular mobile operating system in the world by early 2011.[1]
While the interesting part of Android forensics involves the acquisition and analysis of data from
devices, it is important to have a broad understanding of both the platform and the tools that will be used
throughout the investigation. A thorough understanding will assist a forensic examiner or security engineer
through the successful investigation and analysis of an Android device.
1.1 Digital Forensic Investigation Process:-
A forensic Investigation is a process that creates and tests hypotheses to answer questions about an
incident that happened. For instance, questions include “what caused the incident to occur”, “where did the
incident occur”, “when did the incident occur”, and “who is/are responsible for the incident and what is the
evidence to approve the responsibility”.[1]
To develop and test hypotheses for digital forensic investigation, a concrete chain of activities or steps
need to be followed to ensure the technicality and legality of the investigation. Generally, different digital
devices follow a similar forensic investigation process. So the typical process encompasses the following steps:
A Survey on Mobile Forensic for Android Smartphones
DOI: 10.9790/0661-17211519 www.iosrjournals.org 16 | Page
 Identification: identifying the system or the exhibitions that need to be investigated.
 Data acquisition/ Preservation: taking an image or cloning the data from the exhibition that belongs to an
identified system.
 Data recovery: is the process of restoring or pulling out deleted, hidden or actual data from the image file.
 Forensic analysis: analyzes the digital artifacts inside the data that has been recovered.
 Presentation of Evidences: reporting of evidence found during the analysis face.
The figure below shows the relation between the investigation steps.
Figure (1): Digital Forensic Investigation Process.[1, 3]
For any of the steps above there are variety of tools and techniques that help to accomplish the step.
These tools are called digital forensic investigation tools. A generally accepted definition of digital forensic
investigation tool is a piece of software or hardware that is used to perform one or more of the above
investigation steps.
These tools and techniques are different from one device to another. For example, computer devices
have a set of tools that are totally different from smartphone tools. The diversity of forensic investigation tool
has come about because of the reason that distinctive computerized or digital device have different hardware
and software specifications. Hardware specifications that might differ from one device to another are such as the
processor architecture, the type of the main board, type of input/output interfaces and the type of primary
storage. Software specifications are such as Operating System (OS), file systems and development environment.
Therefore this paper focuses on the digital forensic tools that are specialized on smart phones that are bundled
with Android OS.[3]
1.2 Android Platform and Smartphones:-
Andre. H defines the Android to refer to an open source mobile device platform that has been
developed based on the Linux 2.6 kernel and managed by the Open Handset Alliance, a group of carriers,
mobile device and component manufacturers, and software vendors. The history of android as a platform for
smartphone has begun in 2008 after the first smartphone was introduced. Since 2008 and up to now, Android
had made a remarkable impact on the smartphone market. [1, 4]
Referring to statement in Android.com website, android is the OS that manage more than one billion
smartphones and tablets and consequently, this fact makes Android smartphone are one of the most desirable
smartphone in the global market. According to International Data Corporation (IDC) which is a premier global
provider of market information services and tracks the shipment of smartphone worldwide, the worldwide
android smartphone market grew from 60% to reach nearly 85% by the third quarter of 2014. The figure below
shows the market share of android smartphone worldwide based on shipment information. [5]
A Survey on Mobile Forensic for Android Smartphones
DOI: 10.9790/0661-17211519 www.iosrjournals.org 17 | Page
Figure (2) smartphone shipment market share based on smartphone‟s OS [5]
1.2.1 Android Platform Main Components:
Following top-down approach, android platform Architecture is divided into three main layers which encompass
an applications, middleware and operating system. More breaks down to the architecture, the application
contains two components, the middleware also consists of two components and finally the OS layer can be
divided into subcomponents. The following is a brief description for the main components of the different
layers:
 Applications: Some of the major Applications software that are either come with default package of
software supported by the Android OS version or installed from android software markets such as Calendar,
Maps, Browser, Contact, and Scheduler. Etc.
 Application framework: it‟s a layer below the application and it provides the framework application
programing interfaces (API) used by the different running applications.
 Libraries: it‟s a layer below the application framework and provides core features libraries that can be
used by the applications. The most important library is libc, the standard C programing library. Additionally,
graphic libraries such as openGL and input/output libraries are also important to the applications.
 Android Runtime: its main part of the libraries layer and it includes of the Dalvik Virtual Machine
(DVM) and Core Libraries. The Core Libraries provide support functionalities of numerous core libraries used
in Java programing languages.
 Linux Kernel: the Kernel available with Android is 2.6 versions. It contains of a massive list of
various drivers used to run different applications. Some of the common drivers available are WiFi, audio,
camera, print, video conferencing, etc.[1, 2]
The figure below shows the components of the Android platform.
Figure (3) Android platform components. [2]
Understanding android architecture and its main components ease the process of investigating
smartphones that are bundled with android platform. Of course, nothing worth doing is easy and applying digital
forensic for both traditional mobile phones and smartphones have a host of challenges that need to be overcome.
Moreover, comprehensive knowledge about the software and hardware architecture of android smartphones
helps the digital forensic practitioner to obtain the right tools to perform the steps of the digital investigation,
A Survey on Mobile Forensic for Android Smartphones
DOI: 10.9790/0661-17211519 www.iosrjournals.org 18 | Page
taking into account that an essential goal of digital forensic is protecting any modification of the target device‟s
data by the practitioner. [1, 3]
II. Digital Forensic Tools for Android
There are bunch of tools that are dedicated for performing digital investigation for android
smartphones. Some of these tools are integrated in a framework with other digital forensic tools that serves other
type of smartphones‟ platforms. The following are the main tools that are used for investigating android
smartphones.
Android Debug Bridge (ABD): is a multipurpose command line tool that lets you communicate with connected
Android-powered device. Throughout a forensics examination the investigator may come across and need to
interact with debugging mode of the android platform to pull out some files or to check the value of a certain
parameter. The ABD tools are also used by the majority of smartphones‟ forensic framework as the main
subcomponent to communicate with the android platform. The ABD tool can be used to fulfil the data
acquisition step. [1, 6]
Open Source Android Forensics (OSAF): is an open source unified android forensic that its main focus on
investigating malware with in android applications. It follows a standardized process for forensic investigation
and a set of best practices for analyzing Android applications OSAF can be used for forensic analysis and
presentation of evidences steps [7]
Andriller: is a utility with a group of forensic tools for smartphones. Part of these bundled tools are specialized
in android forensic. It performs read-only, forensically sound, non-destructive acquisition from Android devices.
It has other features, such as powerful Lock screen cracking for Pattern, PIN code, or Password; custom
decoders for applications from android smartphones. Beside data acquisition, Andriller can also be used for data
recovery, forensic analysis and presentation of evidences steps [8]
AFLogical: is an open source extraction tools, available on GitHub that can be used to extract calls, SMS,
MMS, MMS parts and contacts from android mobile phones. It creates a directory named with time and date of
extraction. It can be used for forensic analysis and presentation of evidences steps. [9]
WHATSAPP EXTRACT: is an open source tool for WhatsApp extraction and analysis. It‟s able to display in
an HTML document of all WhatsApp messages extracted from an android phone and iPhone as well.
Nowadays, WhatsApp is a wide used instant messaging application. This tool is specialized on forensic analysis
and presentation of evidence that could be found on WhatsApp application.[10]
SKYPE EXTRACTOR: is an open source tool for extracting skype application data. It can be used to analyze
skype application on an android phone. It can extract data such as Account info, contacts info, calls, chats, file
transfer, voice mails and deleted and modified messages. This tool is specialized on forensic analysis, data
recovery and presentation of evidence that could be found on skype application.[10]
Generally, Android Forensic tools should be able to investigate various types of data in the android smartphone.
The following table shows a sample of data that can be extracted.
Text messages
(SMS/MMS)
Contacts Call logs E-mail messages
(Gmail, Yahoo,
Exchange)
Instant
Messenger/Chat
GPS coordinates
Photos/Videos Web history Search history Driving directions Facebook, Twitter,
and other social
media clients
Files stored on the
device
Music collections Calendar
appointments
Financial
information
Shopping history File sharing
Tables (1) sample of extracted data from Android smartphone.
2.1 Android Forensic Tools Comparison:
The chart below shows a comparison between the above android forensic tools
ABD Andriller OSAF AFLogical Whatsapp
Extract
Skype Extractor
Command lines √
GUI √ √ √ √ √
Android OS √ √ √ √ √ √
Other OS √ √ √ √
Support All Apps √ √ √ √
Digital Forensic Investigation Process Support
Identification √ √ √ √
Preservation √ √ √ √ √ √
Data Recovery √ √ √ √ √
Forensic Analysis √ √ √ √ √
Presentation √ √ √ √ √
Tables (2) comparison between android tools
Tools
Features
A Survey on Mobile Forensic for Android Smartphones
DOI: 10.9790/0661-17211519 www.iosrjournals.org 19 | Page
The results obtained from the above table shows that Andriller, OSAF and AFLogical tools covers
more steps in the digital forensic investigation process. Other tools are specialized in one step or one task. For
instance, WhatsApp Extract and Skype Extract are only specialized on WhatsApp and Skype applications.
III. Conclusion & Future Work:
No doubt, mobile forensics or digital forensic investigation for mobile devices is the fastest growing
and evolving digital forensic discipline. The digital forensic process for any devices is consisted of different
steps, starts with the identification, data acquisition, data recovery, forensic analysis and presentation of
evidences.
Android as a platform for mobile devices has dominated in the market of smartphone industry. So
finding solutions for digitally investigating android smartphone is a critical mission that any digital forensic
practitioner should handle. However, knowing the software and hardware architecture of the android smart
phone is a crucial step for finding the appropriate tool to perform the digital investigation steps. The spectrum of
android forensic investigation is full with many available tools that can handle different steps of the digital
investigation process. This paper shows part of the tools that can be used to handle the investigation process
and open the door for creating special framework that can follow the standard process of digital forensic for
Android smartphones.
References:
[1]. A. Hoog, Android Forensics:Investigation, Analysis and Mobile Security for Google Android: Syngress, 2011.
[2]. L. ı. N. Claudio Maia, Lu´ıs Miguel Pinho. (2014, Evaluating Android OS for Embedded Real-Time Systems. Cyber Forensics.
[3]. E. H. S. Brian D. Carrier. 02/02/2015). An Event-Based Digital Forensic Investigation Framework. Available: http://www.digital-
evidence.org/papers/dfrws_event.pdf
[4]. Android.com. (2014). History of Android. Available: http://www.android.com/history/
[5]. idc.com. Smartphones Market share , Q3 2014. Available: http://www.idc.com/prodserv/smartphone-os-market-share.jsp
[6]. Developer.android, Android Debug Bridge
[7]. http://osaf-community.org/. (2015). OSAF Open Source Android Forensics. Available: http://osaf-community.org/wiki/tiki-
index.php
[8]. Andriller.com. (2015). Andriller. Available: https://andriller.com/
[9]. viaforensic.com. (2014). Android forensics. Available: https://github.com/viaforensics/android-forensics
[10]. O. S. T. f. M. F.-. SANS. (2013. Available: https://digital-forensics.sans.org/summit-
archives/Prague_Summit/Open_Source_Tools_for_Mobile_Forensics_Mattia_Eppifani.pdf

More Related Content

What's hot

ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...IRJET Journal
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone dataINFOGAIN PUBLICATION
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesCSCJournals
 
Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialogiosrjce
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
 
Penetration Testing for Android Smartphones
Penetration Testing for Android SmartphonesPenetration Testing for Android Smartphones
Penetration Testing for Android SmartphonesIOSR Journals
 
Data Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile SystemsData Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile SystemsIOSR Journals
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniquesijdpsjournal
 
Internet of Things Malware : A Survey
Internet of Things Malware : A SurveyInternet of Things Malware : A Survey
Internet of Things Malware : A SurveyIJCSES Journal
 
The protect mobile user data in Russia
The protect mobile user data in Russia The protect mobile user data in Russia
The protect mobile user data in Russia IJECEIAES
 
Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniquescsandit
 

What's hot (16)

ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
20120140504023
2012014050402320120140504023
20120140504023
 
AD-MPEX-BRO-09Dec2014
AD-MPEX-BRO-09Dec2014AD-MPEX-BRO-09Dec2014
AD-MPEX-BRO-09Dec2014
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone data
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection Techniques
 
Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialog
 
IMPLEMENTATION OF SECURE DOOR AUTOMATION SYSTEMS USING INFRARED SENSORS
IMPLEMENTATION OF SECURE DOOR AUTOMATION SYSTEMS USING  INFRARED SENSORS IMPLEMENTATION OF SECURE DOOR AUTOMATION SYSTEMS USING  INFRARED SENSORS
IMPLEMENTATION OF SECURE DOOR AUTOMATION SYSTEMS USING INFRARED SENSORS
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...
 
Penetration Testing for Android Smartphones
Penetration Testing for Android SmartphonesPenetration Testing for Android Smartphones
Penetration Testing for Android Smartphones
 
Data Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile SystemsData Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile Systems
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
Internet of Things Malware : A Survey
Internet of Things Malware : A SurveyInternet of Things Malware : A Survey
Internet of Things Malware : A Survey
 
The protect mobile user data in Russia
The protect mobile user data in Russia The protect mobile user data in Russia
The protect mobile user data in Russia
 
Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniques
 

Viewers also liked

Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated LoadsClosed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated LoadsIOSR Journals
 
The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...
The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...
The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...IOSR Journals
 
Cutting Parameter Optimization for Surface Finish and Hole Accuracy in Drilli...
Cutting Parameter Optimization for Surface Finish and Hole Accuracy in Drilli...Cutting Parameter Optimization for Surface Finish and Hole Accuracy in Drilli...
Cutting Parameter Optimization for Surface Finish and Hole Accuracy in Drilli...IOSR Journals
 
Microcontroller-Based Metal Detection System with GSM Technology
Microcontroller-Based Metal Detection System with GSM TechnologyMicrocontroller-Based Metal Detection System with GSM Technology
Microcontroller-Based Metal Detection System with GSM TechnologyIOSR Journals
 
Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...
Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...
Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...IOSR Journals
 
The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...
The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...
The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...IOSR Journals
 
Determination ofRadiological Quality Parameters Using Optical Densitometer an...
Determination ofRadiological Quality Parameters Using Optical Densitometer an...Determination ofRadiological Quality Parameters Using Optical Densitometer an...
Determination ofRadiological Quality Parameters Using Optical Densitometer an...IOSR Journals
 
Implementation of an Improved Microcontroller Based Moving Message Display Sy...
Implementation of an Improved Microcontroller Based Moving Message Display Sy...Implementation of an Improved Microcontroller Based Moving Message Display Sy...
Implementation of an Improved Microcontroller Based Moving Message Display Sy...IOSR Journals
 
Modelling of PV Array with MPP Tracking & Boost DC-DC Converter
Modelling of PV Array with MPP Tracking & Boost DC-DC ConverterModelling of PV Array with MPP Tracking & Boost DC-DC Converter
Modelling of PV Array with MPP Tracking & Boost DC-DC ConverterIOSR Journals
 
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...IOSR Journals
 
Best Power Surge Using Fuzzy Controlled Genetic Technique
Best Power Surge Using Fuzzy Controlled Genetic TechniqueBest Power Surge Using Fuzzy Controlled Genetic Technique
Best Power Surge Using Fuzzy Controlled Genetic TechniqueIOSR Journals
 
Spatial Scalable Video Compression Using H.264
Spatial Scalable Video Compression Using H.264Spatial Scalable Video Compression Using H.264
Spatial Scalable Video Compression Using H.264IOSR Journals
 
Why And Why Not To Go For HVDC?
Why And Why Not To Go For HVDC?Why And Why Not To Go For HVDC?
Why And Why Not To Go For HVDC?IOSR Journals
 
New Approach for Determination of Propagation Model Adapted To an Environment...
New Approach for Determination of Propagation Model Adapted To an Environment...New Approach for Determination of Propagation Model Adapted To an Environment...
New Approach for Determination of Propagation Model Adapted To an Environment...IOSR Journals
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksIOSR Journals
 
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...IOSR Journals
 
Data Usage Monitor for a Shared Wireless Network Connection
Data Usage Monitor for a Shared Wireless Network ConnectionData Usage Monitor for a Shared Wireless Network Connection
Data Usage Monitor for a Shared Wireless Network ConnectionIOSR Journals
 
Investigation of Thermal Insulation on Ice Coolers
Investigation of Thermal Insulation on Ice CoolersInvestigation of Thermal Insulation on Ice Coolers
Investigation of Thermal Insulation on Ice CoolersIOSR Journals
 
Design and Implementation of an Improved Wind Speed Meter (Anemometer)
Design and Implementation of an Improved Wind Speed Meter (Anemometer)Design and Implementation of an Improved Wind Speed Meter (Anemometer)
Design and Implementation of an Improved Wind Speed Meter (Anemometer)IOSR Journals
 
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...IOSR Journals
 

Viewers also liked (20)

Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated LoadsClosed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
 
The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...
The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...
The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...
 
Cutting Parameter Optimization for Surface Finish and Hole Accuracy in Drilli...
Cutting Parameter Optimization for Surface Finish and Hole Accuracy in Drilli...Cutting Parameter Optimization for Surface Finish and Hole Accuracy in Drilli...
Cutting Parameter Optimization for Surface Finish and Hole Accuracy in Drilli...
 
Microcontroller-Based Metal Detection System with GSM Technology
Microcontroller-Based Metal Detection System with GSM TechnologyMicrocontroller-Based Metal Detection System with GSM Technology
Microcontroller-Based Metal Detection System with GSM Technology
 
Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...
Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...
Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...
 
The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...
The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...
The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...
 
Determination ofRadiological Quality Parameters Using Optical Densitometer an...
Determination ofRadiological Quality Parameters Using Optical Densitometer an...Determination ofRadiological Quality Parameters Using Optical Densitometer an...
Determination ofRadiological Quality Parameters Using Optical Densitometer an...
 
Implementation of an Improved Microcontroller Based Moving Message Display Sy...
Implementation of an Improved Microcontroller Based Moving Message Display Sy...Implementation of an Improved Microcontroller Based Moving Message Display Sy...
Implementation of an Improved Microcontroller Based Moving Message Display Sy...
 
Modelling of PV Array with MPP Tracking & Boost DC-DC Converter
Modelling of PV Array with MPP Tracking & Boost DC-DC ConverterModelling of PV Array with MPP Tracking & Boost DC-DC Converter
Modelling of PV Array with MPP Tracking & Boost DC-DC Converter
 
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
 
Best Power Surge Using Fuzzy Controlled Genetic Technique
Best Power Surge Using Fuzzy Controlled Genetic TechniqueBest Power Surge Using Fuzzy Controlled Genetic Technique
Best Power Surge Using Fuzzy Controlled Genetic Technique
 
Spatial Scalable Video Compression Using H.264
Spatial Scalable Video Compression Using H.264Spatial Scalable Video Compression Using H.264
Spatial Scalable Video Compression Using H.264
 
Why And Why Not To Go For HVDC?
Why And Why Not To Go For HVDC?Why And Why Not To Go For HVDC?
Why And Why Not To Go For HVDC?
 
New Approach for Determination of Propagation Model Adapted To an Environment...
New Approach for Determination of Propagation Model Adapted To an Environment...New Approach for Determination of Propagation Model Adapted To an Environment...
New Approach for Determination of Propagation Model Adapted To an Environment...
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
 
Data Usage Monitor for a Shared Wireless Network Connection
Data Usage Monitor for a Shared Wireless Network ConnectionData Usage Monitor for a Shared Wireless Network Connection
Data Usage Monitor for a Shared Wireless Network Connection
 
Investigation of Thermal Insulation on Ice Coolers
Investigation of Thermal Insulation on Ice CoolersInvestigation of Thermal Insulation on Ice Coolers
Investigation of Thermal Insulation on Ice Coolers
 
Design and Implementation of an Improved Wind Speed Meter (Anemometer)
Design and Implementation of an Improved Wind Speed Meter (Anemometer)Design and Implementation of an Improved Wind Speed Meter (Anemometer)
Design and Implementation of an Improved Wind Speed Meter (Anemometer)
 
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
 

Similar to A Survey on Mobile Forensic for Android Smartphones

Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...theijes
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various ToolsIRJET Journal
 
A Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files SystemA Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files SystemCSCJournals
 
1668170.ppt
1668170.ppt1668170.ppt
1668170.ppt230405
 
A survey on android security: development and deployment hindrance and best p...
A survey on android security: development and deployment hindrance and best p...A survey on android security: development and deployment hindrance and best p...
A survey on android security: development and deployment hindrance and best p...TELKOMNIKA JOURNAL
 
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...IJECEIAES
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESijmnct
 
Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devicesijmnct
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...IOSR Journals
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET Journal
 
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSSPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSijwmn
 
Mobile Operating Systems and Application Development Platforms: A Survey
Mobile Operating Systems and Application Development Platforms: A SurveyMobile Operating Systems and Application Development Platforms: A Survey
Mobile Operating Systems and Application Development Platforms: A SurveyEswar Publications
 
MOBILE PHONE SENSORS META-MODEL
MOBILE PHONE SENSORS META-MODELMOBILE PHONE SENSORS META-MODEL
MOBILE PHONE SENSORS META-MODELijasuc
 
MOBILE PHONE SENSORS META-MODEL
MOBILE PHONE SENSORS META-MODELMOBILE PHONE SENSORS META-MODEL
MOBILE PHONE SENSORS META-MODELijasuc
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesIRJET Journal
 
লেকচার ১ (ক)- শুরুর আগে:
লেকচার ১ (ক)- শুরুর আগে:লেকচার ১ (ক)- শুরুর আগে:
লেকচার ১ (ক)- শুরুর আগে:Ahsanul Karim
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionIJERA Editor
 
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...AM Publications
 

Similar to A Survey on Mobile Forensic for Android Smartphones (20)

Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
 
A Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files SystemA Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files System
 
1668170.ppt
1668170.ppt1668170.ppt
1668170.ppt
 
A017360104
A017360104A017360104
A017360104
 
A survey on android security: development and deployment hindrance and best p...
A survey on android security: development and deployment hindrance and best p...A survey on android security: development and deployment hindrance and best p...
A survey on android security: development and deployment hindrance and best p...
 
safe journey
safe journeysafe journey
safe journey
 
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
 
Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devices
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSSPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
 
Mobile Operating Systems and Application Development Platforms: A Survey
Mobile Operating Systems and Application Development Platforms: A SurveyMobile Operating Systems and Application Development Platforms: A Survey
Mobile Operating Systems and Application Development Platforms: A Survey
 
MOBILE PHONE SENSORS META-MODEL
MOBILE PHONE SENSORS META-MODELMOBILE PHONE SENSORS META-MODEL
MOBILE PHONE SENSORS META-MODEL
 
MOBILE PHONE SENSORS META-MODEL
MOBILE PHONE SENSORS META-MODELMOBILE PHONE SENSORS META-MODEL
MOBILE PHONE SENSORS META-MODEL
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and Defenses
 
লেকচার ১ (ক)- শুরুর আগে:
লেকচার ১ (ক)- শুরুর আগে:লেকচার ১ (ক)- শুরুর আগে:
লেকচার ১ (ক)- শুরুর আগে:
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
 
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 

Recently uploaded (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 

A Survey on Mobile Forensic for Android Smartphones

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 15-19 www.iosrjournals.org DOI: 10.9790/0661-17211519 www.iosrjournals.org 15 | Page A Survey on Mobile Forensic for Android Smartphones 1 Abdalazim Abdallah Mohammed Alamin, 2 Dr.Amin Babiker A/Nabi Mustafa 12 ,Department of Communications, Faculty of Engineering, Al-Neelain University Khartoum, Sudan Abstract: Mobile forensic is fast becoming an abbreviated term that describes the process of applying digital forensics in mobile phones world. The rapid development in mobile phones industry has led to the emergence of the so-called smart phones which have become nearly the same as computers. Android Smartphones refer to all types of smartphones that use Android operating system. This paper aims to survey the tools and techniques that are used to forensically investigate Android mobile and then provides comparison between the tools according to their roles in the investigation process. Finally, the paper gives recommendation for following the best practices for investigating Android smartphones. I. Introduction Digital forensics is an interesting fast-paced field that can have a powerful impact on a wide range of situations such as internal corporate investigations, civil litigation, criminal investigations, intelligence gathering, and issues such as national security. As has been defined by National Security Database (NSD), digital forensics is a branch of forensic science including the retrieval and investigation of material found in digital devices, often related to computer crime.[1] Originally the term was used to exclusively describe the process of forensic investigation of crimes that takes place in computers „network or the computer has been used as a weapon to conduct the criminal activities, but now the term is widely used to define all types of crimes where any type of digital devices is a subject or an object in the crime scene.[1, 2] Regardless the type of digital device, the process of forensically investigating such type of devices involves data acquisition which refers to cloning the data from the device to an external source, analysis of the data using analytical tools to classify the data groups and recover information from the data source and finally highlighting the interesting findings that would be potentially evidence for proving the criminal activities.[3] A digital device could be a computer, a mobile phone, a tablet device or any type of electronic devices. So now, digital forensics as a science is encompassing many sub-disciplines such as computer forensics, Mobile forensic and network forensic. The scope of this paper is to focus on mobile forensics. Mobile device forensic, cellular phone forensic or mobile forensics are all synonyms to the same term which refers to the branch of digital forensics that concern with recovering of digital evidence or data from a mobile device under forensically sound conditions. Mobile forensics, arguably the fastest growing and evolving digital forensics discipline and this is according to the rapid growth in mobile phone industry and it offers significant opportunities as well as many challenges. One of the most significant break throughs in the development of mobile phone industry is the emergence of what is known today as smartphones.Unlike traditional mobile phones, smart phones are bundled with a complete operating system and many other applications that help users to interact with many data and voice services. According to (Android forensic), the Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011.[1] While the interesting part of Android forensics involves the acquisition and analysis of data from devices, it is important to have a broad understanding of both the platform and the tools that will be used throughout the investigation. A thorough understanding will assist a forensic examiner or security engineer through the successful investigation and analysis of an Android device. 1.1 Digital Forensic Investigation Process:- A forensic Investigation is a process that creates and tests hypotheses to answer questions about an incident that happened. For instance, questions include “what caused the incident to occur”, “where did the incident occur”, “when did the incident occur”, and “who is/are responsible for the incident and what is the evidence to approve the responsibility”.[1] To develop and test hypotheses for digital forensic investigation, a concrete chain of activities or steps need to be followed to ensure the technicality and legality of the investigation. Generally, different digital devices follow a similar forensic investigation process. So the typical process encompasses the following steps:
  • 2. A Survey on Mobile Forensic for Android Smartphones DOI: 10.9790/0661-17211519 www.iosrjournals.org 16 | Page  Identification: identifying the system or the exhibitions that need to be investigated.  Data acquisition/ Preservation: taking an image or cloning the data from the exhibition that belongs to an identified system.  Data recovery: is the process of restoring or pulling out deleted, hidden or actual data from the image file.  Forensic analysis: analyzes the digital artifacts inside the data that has been recovered.  Presentation of Evidences: reporting of evidence found during the analysis face. The figure below shows the relation between the investigation steps. Figure (1): Digital Forensic Investigation Process.[1, 3] For any of the steps above there are variety of tools and techniques that help to accomplish the step. These tools are called digital forensic investigation tools. A generally accepted definition of digital forensic investigation tool is a piece of software or hardware that is used to perform one or more of the above investigation steps. These tools and techniques are different from one device to another. For example, computer devices have a set of tools that are totally different from smartphone tools. The diversity of forensic investigation tool has come about because of the reason that distinctive computerized or digital device have different hardware and software specifications. Hardware specifications that might differ from one device to another are such as the processor architecture, the type of the main board, type of input/output interfaces and the type of primary storage. Software specifications are such as Operating System (OS), file systems and development environment. Therefore this paper focuses on the digital forensic tools that are specialized on smart phones that are bundled with Android OS.[3] 1.2 Android Platform and Smartphones:- Andre. H defines the Android to refer to an open source mobile device platform that has been developed based on the Linux 2.6 kernel and managed by the Open Handset Alliance, a group of carriers, mobile device and component manufacturers, and software vendors. The history of android as a platform for smartphone has begun in 2008 after the first smartphone was introduced. Since 2008 and up to now, Android had made a remarkable impact on the smartphone market. [1, 4] Referring to statement in Android.com website, android is the OS that manage more than one billion smartphones and tablets and consequently, this fact makes Android smartphone are one of the most desirable smartphone in the global market. According to International Data Corporation (IDC) which is a premier global provider of market information services and tracks the shipment of smartphone worldwide, the worldwide android smartphone market grew from 60% to reach nearly 85% by the third quarter of 2014. The figure below shows the market share of android smartphone worldwide based on shipment information. [5]
  • 3. A Survey on Mobile Forensic for Android Smartphones DOI: 10.9790/0661-17211519 www.iosrjournals.org 17 | Page Figure (2) smartphone shipment market share based on smartphone‟s OS [5] 1.2.1 Android Platform Main Components: Following top-down approach, android platform Architecture is divided into three main layers which encompass an applications, middleware and operating system. More breaks down to the architecture, the application contains two components, the middleware also consists of two components and finally the OS layer can be divided into subcomponents. The following is a brief description for the main components of the different layers:  Applications: Some of the major Applications software that are either come with default package of software supported by the Android OS version or installed from android software markets such as Calendar, Maps, Browser, Contact, and Scheduler. Etc.  Application framework: it‟s a layer below the application and it provides the framework application programing interfaces (API) used by the different running applications.  Libraries: it‟s a layer below the application framework and provides core features libraries that can be used by the applications. The most important library is libc, the standard C programing library. Additionally, graphic libraries such as openGL and input/output libraries are also important to the applications.  Android Runtime: its main part of the libraries layer and it includes of the Dalvik Virtual Machine (DVM) and Core Libraries. The Core Libraries provide support functionalities of numerous core libraries used in Java programing languages.  Linux Kernel: the Kernel available with Android is 2.6 versions. It contains of a massive list of various drivers used to run different applications. Some of the common drivers available are WiFi, audio, camera, print, video conferencing, etc.[1, 2] The figure below shows the components of the Android platform. Figure (3) Android platform components. [2] Understanding android architecture and its main components ease the process of investigating smartphones that are bundled with android platform. Of course, nothing worth doing is easy and applying digital forensic for both traditional mobile phones and smartphones have a host of challenges that need to be overcome. Moreover, comprehensive knowledge about the software and hardware architecture of android smartphones helps the digital forensic practitioner to obtain the right tools to perform the steps of the digital investigation,
  • 4. A Survey on Mobile Forensic for Android Smartphones DOI: 10.9790/0661-17211519 www.iosrjournals.org 18 | Page taking into account that an essential goal of digital forensic is protecting any modification of the target device‟s data by the practitioner. [1, 3] II. Digital Forensic Tools for Android There are bunch of tools that are dedicated for performing digital investigation for android smartphones. Some of these tools are integrated in a framework with other digital forensic tools that serves other type of smartphones‟ platforms. The following are the main tools that are used for investigating android smartphones. Android Debug Bridge (ABD): is a multipurpose command line tool that lets you communicate with connected Android-powered device. Throughout a forensics examination the investigator may come across and need to interact with debugging mode of the android platform to pull out some files or to check the value of a certain parameter. The ABD tools are also used by the majority of smartphones‟ forensic framework as the main subcomponent to communicate with the android platform. The ABD tool can be used to fulfil the data acquisition step. [1, 6] Open Source Android Forensics (OSAF): is an open source unified android forensic that its main focus on investigating malware with in android applications. It follows a standardized process for forensic investigation and a set of best practices for analyzing Android applications OSAF can be used for forensic analysis and presentation of evidences steps [7] Andriller: is a utility with a group of forensic tools for smartphones. Part of these bundled tools are specialized in android forensic. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has other features, such as powerful Lock screen cracking for Pattern, PIN code, or Password; custom decoders for applications from android smartphones. Beside data acquisition, Andriller can also be used for data recovery, forensic analysis and presentation of evidences steps [8] AFLogical: is an open source extraction tools, available on GitHub that can be used to extract calls, SMS, MMS, MMS parts and contacts from android mobile phones. It creates a directory named with time and date of extraction. It can be used for forensic analysis and presentation of evidences steps. [9] WHATSAPP EXTRACT: is an open source tool for WhatsApp extraction and analysis. It‟s able to display in an HTML document of all WhatsApp messages extracted from an android phone and iPhone as well. Nowadays, WhatsApp is a wide used instant messaging application. This tool is specialized on forensic analysis and presentation of evidence that could be found on WhatsApp application.[10] SKYPE EXTRACTOR: is an open source tool for extracting skype application data. It can be used to analyze skype application on an android phone. It can extract data such as Account info, contacts info, calls, chats, file transfer, voice mails and deleted and modified messages. This tool is specialized on forensic analysis, data recovery and presentation of evidence that could be found on skype application.[10] Generally, Android Forensic tools should be able to investigate various types of data in the android smartphone. The following table shows a sample of data that can be extracted. Text messages (SMS/MMS) Contacts Call logs E-mail messages (Gmail, Yahoo, Exchange) Instant Messenger/Chat GPS coordinates Photos/Videos Web history Search history Driving directions Facebook, Twitter, and other social media clients Files stored on the device Music collections Calendar appointments Financial information Shopping history File sharing Tables (1) sample of extracted data from Android smartphone. 2.1 Android Forensic Tools Comparison: The chart below shows a comparison between the above android forensic tools ABD Andriller OSAF AFLogical Whatsapp Extract Skype Extractor Command lines √ GUI √ √ √ √ √ Android OS √ √ √ √ √ √ Other OS √ √ √ √ Support All Apps √ √ √ √ Digital Forensic Investigation Process Support Identification √ √ √ √ Preservation √ √ √ √ √ √ Data Recovery √ √ √ √ √ Forensic Analysis √ √ √ √ √ Presentation √ √ √ √ √ Tables (2) comparison between android tools Tools Features
  • 5. A Survey on Mobile Forensic for Android Smartphones DOI: 10.9790/0661-17211519 www.iosrjournals.org 19 | Page The results obtained from the above table shows that Andriller, OSAF and AFLogical tools covers more steps in the digital forensic investigation process. Other tools are specialized in one step or one task. For instance, WhatsApp Extract and Skype Extract are only specialized on WhatsApp and Skype applications. III. Conclusion & Future Work: No doubt, mobile forensics or digital forensic investigation for mobile devices is the fastest growing and evolving digital forensic discipline. The digital forensic process for any devices is consisted of different steps, starts with the identification, data acquisition, data recovery, forensic analysis and presentation of evidences. Android as a platform for mobile devices has dominated in the market of smartphone industry. So finding solutions for digitally investigating android smartphone is a critical mission that any digital forensic practitioner should handle. However, knowing the software and hardware architecture of the android smart phone is a crucial step for finding the appropriate tool to perform the digital investigation steps. The spectrum of android forensic investigation is full with many available tools that can handle different steps of the digital investigation process. This paper shows part of the tools that can be used to handle the investigation process and open the door for creating special framework that can follow the standard process of digital forensic for Android smartphones. References: [1]. A. Hoog, Android Forensics:Investigation, Analysis and Mobile Security for Google Android: Syngress, 2011. [2]. L. ı. N. Claudio Maia, Lu´ıs Miguel Pinho. (2014, Evaluating Android OS for Embedded Real-Time Systems. Cyber Forensics. [3]. E. H. S. Brian D. Carrier. 02/02/2015). An Event-Based Digital Forensic Investigation Framework. Available: http://www.digital- evidence.org/papers/dfrws_event.pdf [4]. Android.com. (2014). History of Android. Available: http://www.android.com/history/ [5]. idc.com. Smartphones Market share , Q3 2014. Available: http://www.idc.com/prodserv/smartphone-os-market-share.jsp [6]. Developer.android, Android Debug Bridge [7]. http://osaf-community.org/. (2015). OSAF Open Source Android Forensics. Available: http://osaf-community.org/wiki/tiki- index.php [8]. Andriller.com. (2015). Andriller. Available: https://andriller.com/ [9]. viaforensic.com. (2014). Android forensics. Available: https://github.com/viaforensics/android-forensics [10]. O. S. T. f. M. F.-. SANS. (2013. Available: https://digital-forensics.sans.org/summit- archives/Prague_Summit/Open_Source_Tools_for_Mobile_Forensics_Mattia_Eppifani.pdf