2013
DOI: 10.1016/j.diin.2013.06.001
|View full text |Cite
|
Sign up to set email alerts
|

A study of user data integrity during acquisition of Android devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0
1

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(32 citation statements)
references
References 2 publications
0
31
0
1
Order By: Relevance
“…This is also a contentious issue because it all comes down to the process and the tools used. Another related work is that done by (Son et al, 2013); "A study of user data integrity during acquisition of Android devices". The study proposes to use the JTAG (Joint Test Action Group).…”
Section: Introductionmentioning
confidence: 99%
“…This is also a contentious issue because it all comes down to the process and the tools used. Another related work is that done by (Son et al, 2013); "A study of user data integrity during acquisition of Android devices". The study proposes to use the JTAG (Joint Test Action Group).…”
Section: Introductionmentioning
confidence: 99%
“…An acquisition method based on changing the custom recovery image has been studied in the scholarly works (Vidas et al, 2011;Son et al, 2013). Use of the custom recovery image guarantees the integrity of the user data.…”
Section: Related Workmentioning
confidence: 99%
“…Second, the dump method based on changing the custom recovery image (Son et al, 2013) is the only approach that takes into account the integrity of the user data. However, this method cannot guarantee the integrity of the entire flash memory dump because it also flashes the custom recovery image.…”
Section: Introductionmentioning
confidence: 99%
“…The research paper by Vidas et al (2011) was the motive for Son et al (2013) to conduct an evaluation on the Recovery Mode method the former proposed, in terms of data integrity preservation. Seven rooted Samsung devices running the Android OS took part as a sample.…”
Section: Android Forensicsmentioning
confidence: 99%