Abstract

Modern cellular phones are potent computing de-vices, and their capabilities are constantly progressing. The Android operating system (OS) is widely used, and the number of accessible apps for Android OS phones is unprecedented. The increasing capabilities of these phones imply that they have distinctive software, memory designs, and storage mechanisms. Furthermore, they are increasingly being used to commit crimes at an alarming rate. This aspect has heightened the need for digital mobile forensics. Because of the rich user data they store, they may be relevant in forensic investigations, and the data must be extracted. However, as this study will show, most of the available tools for mobile forensics rely greatly on rooted (Android) devices to extract data. Rooting, as some of the selected papers in this research will show, poses a key challenge for forensic analysts: user data integrity. Rooting per se, as will be seen, is disadvantageous. It is possible for forensic analysts to extract useful data from Android phones via rooting, but the user data integrity during data acquisition from Android devices is a prime concern. In suggesting an alternative rooting technique for data acquisition from an Android handset, this paper determines whether rooting is forensically sound. This is particularly due to the device’s modification, which a root often requires, that may violate the data integrity.

Highlights

  • It is scarcely fitting to refer to the device that many people use while receiving the occasional call as a telephone currently

  • This study focuses on the aspect of user data integrity by exploring www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol 9, No 12, 2018 whether “rooting” an Android device which is the gaining of administrative privileges before data extraction from Android devices, threatens the user data integrity

  • 1) Hypothesis: If versatile, high-reliability rooting software is used on an Android phone and user data is extracted using forensic software, all the data can be acquired without changing its integrity

Read more

Summary

INTRODUCTION

It is scarcely fitting to refer to the device that many people use while receiving the occasional call as a telephone currently. Due to the devices’ computing capacities (and hardware attributes), the gamut of download-accessible usages and the array of tasks that they can accomplish is astounding These usages/apps are capable of storing data locally in the modern handset [2]. It is probable that these phones have more probative data that can be traced to a user per byte than the majority of PCs, and the acquisition of these data is harder via forensically appropriate methods This problem is partly due to the overabundance of cell handsets that are currently available. The forensic acquisition of data is, to a considerable extent, an “invasive” activity because, typically, investigators “crack” the phone to obtain the needed data This is often done minus the device owner’s consent. The focus on Android devices is due to that Operating System become dominant

AND RELATED WORK
Related Work
RESEARCH MOTIVATION
EXPERIMENTS
Data Acquisition
Data Analysis
Main Points of the Analysis
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.