Examining the file system of Android devices: implications for digital forensics
Автор: Alkattan S., Chiziba A., Pronichev V.D.
Журнал: Международный журнал гуманитарных и естественных наук @intjournal
Рубрика: Юридические науки
Статья в выпуске: 10-1 (97), 2024 года.
Бесплатный доступ
This article explores the critical role of the Android file system in digital forensics, emphasizing its architecture and data storage methods. It highlights the challenges investigators face in data recovery, particularly with deleted files and encryption. A practical case study illustrates the use of the Android Debug Bridge (ADB) for identifying a port scan attack, showcasing the effectiveness of network traffic analysis in uncovering security incidents on Android devices. This examination underscores the importance of understanding the Android file system for successful forensic investigations in an increasingly mobile-centric world.
Android, digital forensics, file system, data recovery, security, adb, sqlite, encryption
Короткий адрес: https://sciup.org/170206853
IDR: 170206853 | DOI: 10.24412/2500-1000-2024-10-1-228-232
Список литературы Examining the file system of Android devices: implications for digital forensics
- Statista. (2023). Market share of smartphone operating systems worldwide from January 2012 to January 2023. Statista.
- Nystrom, P. (2020). Android Forensics: Investigating Mobile Devices. Syngress.
- Carrier, B., & Spafford, E. H. (2004). An Event-Based Digital Forensic Investigation Framework. In Digital Forensics Research Workshop.
- Garfinkel, S. (2010). Digital Forensics Research: The Next 10 Years. ACM Digital Library.
- Cohen, F. (2015). The Computer Forensic Investigator's Handbook. The Forensics Library.