Show simple item record

dc.contributor.authorBing, Zhou
dc.contributor.authorLiu, Qingzhong
dc.contributor.authorByrd, Brittany
dc.date.accessioned2021-12-15T19:57:11Z
dc.date.available2021-12-15T19:57:11Z
dc.date.issued2017-12
dc.identifier.citationByrd, B., Zhou, B., Liu, Q. Android System Partition to Traffic Data? International Journal of Knowledge Engineering, 2017.en_US
dc.identifier.urihttps://hdl.handle.net/20.500.11875/3248
dc.descriptionArticle originally published in International Journal of Knowledge Engineering
dc.description.abstractThe familiarity and prevalence of mobile devices inflates their use as instruments of crime. Law enforcement personnel and mobile forensics investigators, are constantly battling to gain the upper-hand at developing a standardized system able to comprehensively identify and resolve the vulnerabilities present within the mobile device platform. The Android mobile platform can be perceived as an antagonist to this objective, as its open nature provides attackers direct insight into the internalization and security features of the most popular platform presently in the consumer market. This paper identifies and demonstrates the system partition in an Android smartphone as a viable attack vector for covert data trafficking. An implementation strategy (comprised of four experimental phases) is developed to exploit the internal memory of a non-activated rooted Android HTC Desire 510 4g smartphone. A set of mobile forensics tools: AccessData Mobile Phone Examiner Plus (MPE+ v5.5.6), Oxygen Forensic Suite 2015 Standard, and Google Android Debug Bridge adb were used for the extraction and analysis process. The data analysis found the proposed approach to be a persistent and minimally detectable method to exchange dataen_US
dc.description.sponsorshipen_US
dc.publisherInternational Journal of Knowledge Engineeringen_US
dc.relation.ispartofseriesvol 3;no.2
dc.subjectandroid forensicsen_US
dc.subjectfactory reseten_US
dc.subjectsystem partition, AccessData MPE+en_US
dc.subjectoxygen forensic standard suiteen_US
dc.subjectandroid debug bridgeen_US
dc.titleAndroid System Partition to Traffic Data?en_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record