2017 Seventh International Conference on Emerging Security Technologies (EST) 2017
DOI: 10.1109/est.2017.8090395
|View full text |Cite
|
Sign up to set email alerts
|

An investigation into the impact of rooting android device on user data integrity

Abstract: Abstract-The available commercial and freeware mobile forensics tools heavily rely on a rooted mobile device for them to extract data. The potential effects of rooting the device before extraction could pose a threat to the forensic integrity rendering the acquisition process flawed.An endeavour was made in compiling of this paper investigating the impact of rooting android mobile devices on user data integrity. The research examines and analyses data from an android Samsung phone. A framework has been develop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 6 publications
1
2
0
Order By: Relevance
“…The results of the illustrated analyses indicate that no data changes occurred during the rooting process or during data extraction. This result is consistent with the results achieved recently, despite the different experiences and programs used [11]. Nevertheless, the results of the folder analysis show an apparent discrepancy in the amount of data that was retrieved using the Belkasoft Evidence Center.…”
Section: Main Points Of the Analysissupporting
confidence: 91%
“…The results of the illustrated analyses indicate that no data changes occurred during the rooting process or during data extraction. This result is consistent with the results achieved recently, despite the different experiences and programs used [11]. Nevertheless, the results of the folder analysis show an apparent discrepancy in the amount of data that was retrieved using the Belkasoft Evidence Center.…”
Section: Main Points Of the Analysissupporting
confidence: 91%
“…Each time it is started, the app verifies that the device IMEI corresponds to the one embedded in its code and that the device operating system is not rooted or jailbreaked, i.e., unlocked. This last check is performed to further enforce the app security since, in rooted phones, apps are free to access and modify the operating system services as well and other apps (Hassan and Pantaleon, 2017).…”
Section: Process Details and Discussionmentioning
confidence: 99%
“…To achieve this, the authors developed an eight-step mobile forensic examination model. In his study, Pantaleon investigated the effect of rooting process on android mobile devices' user data integrity [9]. In this study, data integrity issues related to user data were examined when a device was rooted before data extraction.…”
Section: Related Workmentioning
confidence: 99%