{"title":"Android Forensics Tools and Security Mechanism: Survey Paper","authors":"Nisreen Amer, Yahia Al-Halabi","doi":"10.1145/3234698.3234710","DOIUrl":null,"url":null,"abstract":"the smarphones technology and capability have been developed dramatically for the past few decades alongside to the areas it is used in. They may have lots of personal and business critical data that are phone to all kind of attackers and for different kind of reasons. Android is one of the most popular operating system (OS) in the mobile field as it is an open source OS which has an accessible code that could be viewed by anyone. This in turn creates a huge hole in the security system and connect the privacy of users together which could have different consequence. This paper will present Android structure and general information about its security mechanisms and the important threats it faces as well as the main artifacts. Additionally, it shows how they will be retrieved by presenting simple comparison between some forensics tools in order to build a study on the nature of Android and how to retrieve data that might be an important evidences and leads for certain case so that it will benefit anyone interested in the field.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3234698.3234710","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
the smarphones technology and capability have been developed dramatically for the past few decades alongside to the areas it is used in. They may have lots of personal and business critical data that are phone to all kind of attackers and for different kind of reasons. Android is one of the most popular operating system (OS) in the mobile field as it is an open source OS which has an accessible code that could be viewed by anyone. This in turn creates a huge hole in the security system and connect the privacy of users together which could have different consequence. This paper will present Android structure and general information about its security mechanisms and the important threats it faces as well as the main artifacts. Additionally, it shows how they will be retrieved by presenting simple comparison between some forensics tools in order to build a study on the nature of Android and how to retrieve data that might be an important evidences and leads for certain case so that it will benefit anyone interested in the field.