2020
DOI: 10.1016/j.jksuci.2018.07.004
|View full text |Cite
|
Sign up to set email alerts
|

Android data storage security: A review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
20
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 30 publications
(20 citation statements)
references
References 17 publications
0
20
0
Order By: Relevance
“…In their paper, Altuwaijri and Ghouzali [6] presented a threat model for storing mobile device data of Android based devices, Figure 1. shows this threat model.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…In their paper, Altuwaijri and Ghouzali [6] presented a threat model for storing mobile device data of Android based devices, Figure 1. shows this threat model.…”
Section: Related Workmentioning
confidence: 99%
“…Altuwaijri and Ghouzali threat model classify threats into Physical and Software threats. [6] Physical threats are possible when mobile devices get into the hands of unauthorized people through loss or theft. These are three types [6]:  Cold boot attackassumes that ram memory is obtained and connected to another device to obtain data from that memory;  Evil maid attackassumes the unencrypted memory area; even if a password is used to encrypt data on your mobile device, the Android partitioning system can be modified with keylogging;  RowHammer attackassumes the use of management vulnerability at the lower levels of the operating system; is the most complex vulnerability of physical.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations