[HTML][HTML] Android data storage security: A review

H Altuwaijri, S Ghouzali - Journal of King Saud University-Computer and …, 2020 - Elsevier
The broad adoption of smartphones has superseded the desktop computers and laptops as
a primary computing platform, due to mobility, constant connectivity and application diversity …

Post-mortem memory analysis of cold-booted android devices

C Hilgers, H Macht, T Müller… - … Conference on IT …, 2014 - ieeexplore.ieee.org
As recently shown in 2013, Android-driven smartphones and tablet PCs are vulnerable to so-
called cold boot attacks. With physical access to an Android device, forensic memory dumps …

[HTML][HTML] One key to rule them all: Recovering the master key from RAM to break Android's file-based encryption

T Groß, M Busch, T Müller - Forensic Science International: Digital …, 2021 - Elsevier
As known for a decade, cold boot attacks can break software-based disk encryption when an
attacker has physical access to a powered-on device, including Android smartphones. Raw …

Dump and analysis of android volatile memory on wechat

F Zhou, Y Yang, Z Ding, G Sun - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
With the popularity of smartphones, various types of mobile crimes emerge endlessly.
Evidence from mobile phones is mostly obtained by non-volatile physical memory dump and …

Contemporary digital forensics investigations of cloud and mobile applications

KKR Choo, A Dehghantanha - … digital forensic investigations of cloud and …, 2017 - Elsevier
Digital forensics is a relatively new and fast growing field of research that is focused on the
development of forensically sound methods for the collection, preservation, and analysis of …

CORMORANT: Ubiquitous risk-aware multi-modal biometric authentication across mobile devices

D Hintze, M Füller, S Scholz, RD Findling… - Proceedings of the …, 2019 - dl.acm.org
People own and carry an increasing number of ubiquitous mobile devices, such as
smartphones, tablets, and notebooks. Being small and mobile, those devices have a high …

Forensics analysis of Android mobile VoIP apps

T Dargahi, A Dehghantanha, M Conti - Contemporary Digital Forensic …, 2017 - Elsevier
Abstract Voice over Internet Protocol (VoIP) applications (apps) provide convenient and low-
cost means for users to communicate and share information with each other in real-time …

Analyzing android's file-based encryption: information leakage through unencrypted metadata

T Groß, M Ahmadova, T Müller - … of the 14th International Conference on …, 2019 - dl.acm.org
We investigate the amount of information leakage through unencrypted metadata in
Android's file-based encryption (FBE) which was introduced as an alternative to the …

A lightweight encryption and secure protocol for smartphone cloud

W Zegers, SY Chang, Y Park… - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
User data on mobile devices are always transferred into Cloud for flexible and location-
independent access to services and resources. The issues of data security and privacy data …

A flexible framework for mobile device forensics based on cold boot attacks

M Huber, B Taubmann, S Wessel, HP Reiser… - EURASIP Journal on …, 2016 - Springer
Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the
degree of security these devices can provide against digital forensics is of particular interest …