2017
DOI: 10.1007/978-981-10-6898-0_24
|View full text |Cite
|
Sign up to set email alerts
|

Challenges in Android Forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…The exact partitioning scheme is dependent on the vendor configuration, but generally, Android phones typically have six partitions. The most common partitions are the /system, /user data, /cache, /boot, and /recovery [5], [6]. The /user data partition is the most forensically pertinent because all the data generated from apps installed by the user is deposited in this partition.…”
Section: A Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…The exact partitioning scheme is dependent on the vendor configuration, but generally, Android phones typically have six partitions. The most common partitions are the /system, /user data, /cache, /boot, and /recovery [5], [6]. The /user data partition is the most forensically pertinent because all the data generated from apps installed by the user is deposited in this partition.…”
Section: A Related Workmentioning
confidence: 99%
“…It is from the /user data partition where evidence files are often acquired. Alternatively, the /recovery partition, which is "the alternative "system" partition" [ [5], p. 288], can be exploited when the system booting fails or when the custom ROM has to be flashed. Forensic investigators use this partition when acquiring a system partition image.…”
Section: A Related Workmentioning
confidence: 99%
See 3 more Smart Citations