Proceedings of the 3rd International Conference on Information Systems Security and Privacy 2017
DOI: 10.5220/0006204101470156
|View full text |Cite
|
Sign up to set email alerts
|

A Technique for Extraction and Analysis of Application Heap Objects within Android Runtime (ART)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…If an authentication mechanism were used in the IM application, the invader could still have access to other features in the smartphone, but not to the messages exchanged in the app. Anyway, there are diverse forensic approaches to the acquisition and analysis of digital evidence in smartphones, including from IM applications [18], [19].…”
Section: Problem Statementmentioning
confidence: 99%
“…If an authentication mechanism were used in the IM application, the invader could still have access to other features in the smartphone, but not to the messages exchanged in the app. Anyway, there are diverse forensic approaches to the acquisition and analysis of digital evidence in smartphones, including from IM applications [18], [19].…”
Section: Problem Statementmentioning
confidence: 99%