Examining the file system of Android devices: implications for digital forensics

Автор: Alkattan S., Chiziba A., Pronichev V.D.

Журнал: Международный журнал гуманитарных и естественных наук @intjournal

Рубрика: Юридические науки

Статья в выпуске: 10-1 (97), 2024 года.

Бесплатный доступ

This article explores the critical role of the Android file system in digital forensics, emphasizing its architecture and data storage methods. It highlights the challenges investigators face in data recovery, particularly with deleted files and encryption. A practical case study illustrates the use of the Android Debug Bridge (ADB) for identifying a port scan attack, showcasing the effectiveness of network traffic analysis in uncovering security incidents on Android devices. This examination underscores the importance of understanding the Android file system for successful forensic investigations in an increasingly mobile-centric world.

Еще

Android, digital forensics, file system, data recovery, security, adb, sqlite, encryption

Короткий адрес: https://sciup.org/170206853

IDR: 170206853   |   DOI: 10.24412/2500-1000-2024-10-1-228-232

Список литературы Examining the file system of Android devices: implications for digital forensics

  • Statista. (2023). Market share of smartphone operating systems worldwide from January 2012 to January 2023. Statista.
  • Nystrom, P. (2020). Android Forensics: Investigating Mobile Devices. Syngress.
  • Carrier, B., & Spafford, E. H. (2004). An Event-Based Digital Forensic Investigation Framework. In Digital Forensics Research Workshop.
  • Garfinkel, S. (2010). Digital Forensics Research: The Next 10 Years. ACM Digital Library.
  • Cohen, F. (2015). The Computer Forensic Investigator's Handbook. The Forensics Library.
Статья научная