2014
DOI: 10.1016/j.cose.2014.01.004
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the privacy of Android mobile applications under forensic analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 32 publications
(15 citation statements)
references
References 6 publications
0
15
0
Order By: Relevance
“…We contrast this with Ntantogian et al [20], who spent three months to evaluate 390 cases for 13 applications.…”
Section: E Servermentioning
confidence: 67%
See 2 more Smart Citations
“…We contrast this with Ntantogian et al [20], who spent three months to evaluate 390 cases for 13 applications.…”
Section: E Servermentioning
confidence: 67%
“…There have been several studies on Android, comparably dumping memory to look for sensitive data [2], [17], [1], [20], [37]. However, all of these approaches required a manual approach to capture and search the relevant memory images.…”
Section: B Test Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…In the last few years, there are some analysis researches on Android volatile memory. Ntantogian [12] has proved that it is possible to extract authentication credentials of user like user username and password of mobile application from the volatile memory of rooted Android devices. Andersen [13] propose a method to retrieve the encryption key of Luks from the volatile memory of Android mobile phone.…”
Section: B Android Volatile Memory Analysismentioning
confidence: 99%
“…Apart from personal computers, sensitive information was also recovered from the volatile memory of Android devices using two different methods. More specifically, in the first method [12] the authors used the Linux Memory Extractor (LiME) kernel module [13] and a physical Samsung i9000 phone to dump the Android memory, whereas in the second technique [14] the Android emulator was used alongside with Dalvik Debug Monitor Server (DDMS) to acquire the memory data. In both cases, critical and secure applications, such as mobile banking and password managers, were examined and authentication credentials were recovered in plain text from the dumped memory.…”
Section: Related Workmentioning
confidence: 99%