2019 International Conference on Platform Technology and Service (PlatCon) 2019
DOI: 10.1109/platcon.2019.8669409
|View full text |Cite
|
Sign up to set email alerts
|

Digital Forensic Analysis using Android Application Cache Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…This information contributes to an investigation with data relating to preceding suspect locations [16]. Another type of forensic artifact is the identification of files present in the cache, which are automatically generated by the applications and may contain important information about the user [17]. One type of application that can create relevant artifacts for forensic investigations are e-dating apps.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This information contributes to an investigation with data relating to preceding suspect locations [16]. Another type of forensic artifact is the identification of files present in the cache, which are automatically generated by the applications and may contain important information about the user [17]. One type of application that can create relevant artifacts for forensic investigations are e-dating apps.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Saxena et al have shown how the Amazon kindle application should be examined on android devices [7]. Kim et al Have shown what remains of the Android applications left in the cache and how they should be analyzed [8]. Karakoca et al have conducted benchmarking tests of android messenger applications in terms of digital forensics [9].…”
Section: Introductionmentioning
confidence: 99%