{"title":"Android取证工具和安全机制:调查报告","authors":"Nisreen Amer, Yahia Al-Halabi","doi":"10.1145/3234698.3234710","DOIUrl":null,"url":null,"abstract":"the smarphones technology and capability have been developed dramatically for the past few decades alongside to the areas it is used in. They may have lots of personal and business critical data that are phone to all kind of attackers and for different kind of reasons. Android is one of the most popular operating system (OS) in the mobile field as it is an open source OS which has an accessible code that could be viewed by anyone. This in turn creates a huge hole in the security system and connect the privacy of users together which could have different consequence. This paper will present Android structure and general information about its security mechanisms and the important threats it faces as well as the main artifacts. Additionally, it shows how they will be retrieved by presenting simple comparison between some forensics tools in order to build a study on the nature of Android and how to retrieve data that might be an important evidences and leads for certain case so that it will benefit anyone interested in the field.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Android Forensics Tools and Security Mechanism: Survey Paper\",\"authors\":\"Nisreen Amer, Yahia Al-Halabi\",\"doi\":\"10.1145/3234698.3234710\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"the smarphones technology and capability have been developed dramatically for the past few decades alongside to the areas it is used in. They may have lots of personal and business critical data that are phone to all kind of attackers and for different kind of reasons. Android is one of the most popular operating system (OS) in the mobile field as it is an open source OS which has an accessible code that could be viewed by anyone. This in turn creates a huge hole in the security system and connect the privacy of users together which could have different consequence. This paper will present Android structure and general information about its security mechanisms and the important threats it faces as well as the main artifacts. Additionally, it shows how they will be retrieved by presenting simple comparison between some forensics tools in order to build a study on the nature of Android and how to retrieve data that might be an important evidences and leads for certain case so that it will benefit anyone interested in the field.\",\"PeriodicalId\":144334,\"journal\":{\"name\":\"Proceedings of the Fourth International Conference on Engineering & MIS 2018\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Fourth International Conference on Engineering & MIS 2018\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3234698.3234710\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3234698.3234710","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Android Forensics Tools and Security Mechanism: Survey Paper
the smarphones technology and capability have been developed dramatically for the past few decades alongside to the areas it is used in. They may have lots of personal and business critical data that are phone to all kind of attackers and for different kind of reasons. Android is one of the most popular operating system (OS) in the mobile field as it is an open source OS which has an accessible code that could be viewed by anyone. This in turn creates a huge hole in the security system and connect the privacy of users together which could have different consequence. This paper will present Android structure and general information about its security mechanisms and the important threats it faces as well as the main artifacts. Additionally, it shows how they will be retrieved by presenting simple comparison between some forensics tools in order to build a study on the nature of Android and how to retrieve data that might be an important evidences and leads for certain case so that it will benefit anyone interested in the field.