Android取证工具和安全机制:调查报告

Nisreen Amer, Yahia Al-Halabi
{"title":"Android取证工具和安全机制:调查报告","authors":"Nisreen Amer, Yahia Al-Halabi","doi":"10.1145/3234698.3234710","DOIUrl":null,"url":null,"abstract":"the smarphones technology and capability have been developed dramatically for the past few decades alongside to the areas it is used in. They may have lots of personal and business critical data that are phone to all kind of attackers and for different kind of reasons. Android is one of the most popular operating system (OS) in the mobile field as it is an open source OS which has an accessible code that could be viewed by anyone. This in turn creates a huge hole in the security system and connect the privacy of users together which could have different consequence. This paper will present Android structure and general information about its security mechanisms and the important threats it faces as well as the main artifacts. Additionally, it shows how they will be retrieved by presenting simple comparison between some forensics tools in order to build a study on the nature of Android and how to retrieve data that might be an important evidences and leads for certain case so that it will benefit anyone interested in the field.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Android Forensics Tools and Security Mechanism: Survey Paper\",\"authors\":\"Nisreen Amer, Yahia Al-Halabi\",\"doi\":\"10.1145/3234698.3234710\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"the smarphones technology and capability have been developed dramatically for the past few decades alongside to the areas it is used in. They may have lots of personal and business critical data that are phone to all kind of attackers and for different kind of reasons. Android is one of the most popular operating system (OS) in the mobile field as it is an open source OS which has an accessible code that could be viewed by anyone. This in turn creates a huge hole in the security system and connect the privacy of users together which could have different consequence. This paper will present Android structure and general information about its security mechanisms and the important threats it faces as well as the main artifacts. Additionally, it shows how they will be retrieved by presenting simple comparison between some forensics tools in order to build a study on the nature of Android and how to retrieve data that might be an important evidences and leads for certain case so that it will benefit anyone interested in the field.\",\"PeriodicalId\":144334,\"journal\":{\"name\":\"Proceedings of the Fourth International Conference on Engineering & MIS 2018\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Fourth International Conference on Engineering & MIS 2018\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3234698.3234710\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3234698.3234710","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

在过去的几十年里,智能手机的技术和功能随着其应用领域的发展而得到了巨大的发展。他们可能有大量的个人和商业关键数据,这些数据被各种各样的攻击者出于不同的原因所利用。Android是移动领域最流行的操作系统(OS)之一,因为它是一个开源的操作系统,具有任何人都可以查看的可访问代码。这反过来又在安全系统中制造了一个巨大的漏洞,并将用户的隐私连接在一起,这可能会产生不同的后果。本文将介绍Android的结构和一般信息,包括其安全机制、面临的重要威胁以及主要工件。此外,它还展示了如何通过在一些取证工具之间进行简单的比较来检索它们,以便建立一个关于Android本质的研究,以及如何检索可能是重要证据的数据,并为某些案件提供线索,从而使任何对该领域感兴趣的人受益。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Android Forensics Tools and Security Mechanism: Survey Paper
the smarphones technology and capability have been developed dramatically for the past few decades alongside to the areas it is used in. They may have lots of personal and business critical data that are phone to all kind of attackers and for different kind of reasons. Android is one of the most popular operating system (OS) in the mobile field as it is an open source OS which has an accessible code that could be viewed by anyone. This in turn creates a huge hole in the security system and connect the privacy of users together which could have different consequence. This paper will present Android structure and general information about its security mechanisms and the important threats it faces as well as the main artifacts. Additionally, it shows how they will be retrieved by presenting simple comparison between some forensics tools in order to build a study on the nature of Android and how to retrieve data that might be an important evidences and leads for certain case so that it will benefit anyone interested in the field.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信