Skip to main content

Android Forensics

  • Chapter
  • First Online:
Introductory Computer Forensics
  • 168k Accesses

Abstract

The objectives of this chapter are to:

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. androidcentral: http://www.androidcentral.com/google-says-there-are-now-14-billion-active-android-devices-worldwide (Accessed Dec. 1st, 2016).

  2. N. Scrivens, X. Lin: Android digital forensics: data, extraction and analysis. ACM TUR-C 2017: 26:1-26:10.

    Google Scholar 

  3. L. Zhang, F. Yu, Q. Ji: The forensic analysis of WeChat message. Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control, (2016): 500–503.

    Google Scholar 

  4. A. Hoog: Android forensics: investigation, analysis and mobile security for google android. Elsevier, 2011.

    Google Scholar 

  5. XJTAG: https://www.xjtag.com/about-jtag/what-is-jtag/ (Accessed Dec. 1st, 2016).

  6. Z3X Easy JTAG: http://easy-jtag.com/ (Accessed Dec. 1st, 2016).

  7. S.J. Yang, J.H. Choi, K.B. Kim, T. Chang: New acquisition method based on firmware update protocols for android smartphones, Digital Investigation. 14 (2015): S68–S76.

    Google Scholar 

  8. Android Developers: https://developer.android.com/guide/topics/providers/content-providers.html (Accessed Dec. 1st, 2016).

  9. N. Al Mutawa, I. Baggili, A. Marrington: Forensic analysis of social networking applications on mobile devices, Digital Investigation. 9 (2012): S24–S33.

    Article  Google Scholar 

  10. T. Vidas, C. Zhang, N. Christin: Toward a general collection methodology for android devices, Digital Investigation. 8 (2011). S14–S24.

    Article  Google Scholar 

  11. N. Son, Y. Lee, D. Kim, J.I. James, S. Lee, K. Lee: A study of user data integrity during acquisition of android devices, Digital Investigation. 10 (2013): S3–S11.

    Article  Google Scholar 

  12. H. Srivastava, S. Tapaswi: Logical acquisition and analysis of data from android mobile devices, Information & Computer Security. 23.5 (2015): 450–475.

    Article  Google Scholar 

  13. N. A. Matuwa, I. Baggili, A. Marrington: Forensic analysis of social networking applications on mobile devices. Digital Investigation, 9(2012): S24–S3.

    Google Scholar 

  14. A. Mahajan, M.S. Dahiya, S.P. Sanghvi: Forensics analysis of instant messenger applications on Android devices. International Journal of Computer Applications, 68(2013): 38–44.

    Article  Google Scholar 

  15. N. S. Thakur: Forensic analysis of WhatsApp on Android smartphones. M.Sc. thesis, University of New Oeleans, New Orleans, LA, Aug. 2013.

    Google Scholar 

  16. C. Anglano, M. Canonico, M. Guazzone: Forensic analysis of the ChatSecure instant messaging application on android smartphones, Digital Investigation 19 (2016): 44–59.

    Article  Google Scholar 

  17. D. Walnycky, I. Baggili, A. Marrington, J. Moore, F. Breitinger: Network and device forensic analysis of android social-messaging applications, Digital Investigation. 14 (2015): S77–S84.

    Google Scholar 

  18. C. Anglano: Forensic analysis of whatsapp messenger on android smartphones, Digital Investigation. 11 (2014): 201–213.

    Google Scholar 

  19. N. A. Barghuthi, H. Said: Social networks IM forensics: encryption analysis. Journal Communications, 2013;8(11).

    Google Scholar 

  20. F. Karpisek, I. Baggili, F. Breitinger: Whatsapp network forensics: decrypting and understanding the Whatsapp call signaling messages. Digital Investigation, 15(2015): 110–118. https://doi.org/10.1016/j.diin.2015.09.002 special Issue: Big Data and Intelligent Data Analysis. http://www.sciencedirect.com/science/article/pii/S174228761500098.

    Article  Google Scholar 

  21. F. Zhou, Y. Yang, Z. Ding, G. Sun: Dump and analysis of android volatile memory on wechat. IEEE International Conference on Communications (ICC), 2015: 7151–7156. https://doi.org/10.1109/ICC.2015.7249467.

  22. C. Silla, Wechat forensic artifacts: Android phone extraction and analysis. Master’s thesis. Purdue University, 2015.

    Google Scholar 

  23. S. Wu, Y. Zhang, X. Wang, X. Xiong, L. Du: Forensic analysis of WeChat on Android smartphones. Digital Investigation, 21 (2017): 3–10.

    Article  Google Scholar 

  24. G. B. Satrya, P. T. Daely, and S. Y. Shin. Android forensics analysis: Private chat on social messenger. In 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN), pages 430–435, July 2016.

    Google Scholar 

  25. G. B. Satrya, P. T. Daely, M. A. Nugroho: Digital forensic analysis of telegram messenger, International Conference on Information, Communication Technology and System (ICTS), 2016.

    Google Scholar 

  26. TeamWin — TWRP: https://dl.twrp.me/Z00T/twrp-3.0.2-4-Z00T.img.html

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lin, X. (2018). Android Forensics. In: Introductory Computer Forensics. Springer, Cham. https://doi.org/10.1007/978-3-030-00581-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00581-8_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00580-1

  • Online ISBN: 978-3-030-00581-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics