[HTML][HTML] Android data storage security: A review
H Altuwaijri, S Ghouzali - Journal of King Saud University-Computer and …, 2020 - Elsevier
The broad adoption of smartphones has superseded the desktop computers and laptops as
a primary computing platform, due to mobility, constant connectivity and application diversity …
a primary computing platform, due to mobility, constant connectivity and application diversity …
Post-mortem memory analysis of cold-booted android devices
C Hilgers, H Macht, T Müller… - … Conference on IT …, 2014 - ieeexplore.ieee.org
As recently shown in 2013, Android-driven smartphones and tablet PCs are vulnerable to so-
called cold boot attacks. With physical access to an Android device, forensic memory dumps …
called cold boot attacks. With physical access to an Android device, forensic memory dumps …
[HTML][HTML] One key to rule them all: Recovering the master key from RAM to break Android's file-based encryption
As known for a decade, cold boot attacks can break software-based disk encryption when an
attacker has physical access to a powered-on device, including Android smartphones. Raw …
attacker has physical access to a powered-on device, including Android smartphones. Raw …
Dump and analysis of android volatile memory on wechat
F Zhou, Y Yang, Z Ding, G Sun - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
With the popularity of smartphones, various types of mobile crimes emerge endlessly.
Evidence from mobile phones is mostly obtained by non-volatile physical memory dump and …
Evidence from mobile phones is mostly obtained by non-volatile physical memory dump and …
Contemporary digital forensics investigations of cloud and mobile applications
KKR Choo, A Dehghantanha - … digital forensic investigations of cloud and …, 2017 - Elsevier
Digital forensics is a relatively new and fast growing field of research that is focused on the
development of forensically sound methods for the collection, preservation, and analysis of …
development of forensically sound methods for the collection, preservation, and analysis of …
CORMORANT: Ubiquitous risk-aware multi-modal biometric authentication across mobile devices
D Hintze, M Füller, S Scholz, RD Findling… - Proceedings of the …, 2019 - dl.acm.org
People own and carry an increasing number of ubiquitous mobile devices, such as
smartphones, tablets, and notebooks. Being small and mobile, those devices have a high …
smartphones, tablets, and notebooks. Being small and mobile, those devices have a high …
Forensics analysis of Android mobile VoIP apps
Abstract Voice over Internet Protocol (VoIP) applications (apps) provide convenient and low-
cost means for users to communicate and share information with each other in real-time …
cost means for users to communicate and share information with each other in real-time …
Analyzing android's file-based encryption: information leakage through unencrypted metadata
T Groß, M Ahmadova, T Müller - … of the 14th International Conference on …, 2019 - dl.acm.org
We investigate the amount of information leakage through unencrypted metadata in
Android's file-based encryption (FBE) which was introduced as an alternative to the …
Android's file-based encryption (FBE) which was introduced as an alternative to the …
A lightweight encryption and secure protocol for smartphone cloud
User data on mobile devices are always transferred into Cloud for flexible and location-
independent access to services and resources. The issues of data security and privacy data …
independent access to services and resources. The issues of data security and privacy data …
A flexible framework for mobile device forensics based on cold boot attacks
Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the
degree of security these devices can provide against digital forensics is of particular interest …
degree of security these devices can provide against digital forensics is of particular interest …