ANDROID FORENSICS

Download
File
eForensics_04_2013.pdf

Readers,

Welcome to new issue of eForensics Mobile. After long period of covering subjects connected with computer and network forensics it’s time for digging into topics related to mobile forensics. We’ve noticed that this topic always draws your attention as forensic study of mobile devices is a relatively new field and it can be particularly challenging on a number of levels . As to start with, this time we shed light on Android Forensics topic. Check what you can find inside:

1. STEP BY STEP ANALYSIS OF FACEBOOK AND TWITTER DATA ON ANDROID DEVICES

by Massimo Barone

The growth of social networks is heavily influenced by the burgeoning numbers of smartphones which allow access to these platforms at any time and from any place. A recent study published by Mashable shows that across all the social networking platforms, including Facebook and Google+, it is Twitter that holds the crown for the fastest growing number of active users.

2. EMULATION DETECTION TECHNIQUES FOR ANDROID
by Victor Antonio Torre Villahoz
Android is an operating system widely used in mobile systems. This past year it has been attacked by Malware, due to its proliferation of phones and tablets from many different manufacturers. There are projects like ‘Droidbox’ (sandbox for Android) that allow security researchers to dynamically analyze applications through the use of the emulator included in the SDK.

3. ANDROID FORENSICS A CASE STUDY OF THE NEXUS S VIRTUAL DEVICE

by Caner KOCAMAZ

If you want to learn to examine an Android Device, you don’t have to get one. You can examine any make and model of Android Device virtually. In this case study, we will logically extract SQLite database files from the device emulator.

4. APPROACH TO EXTRACTING DATA USING HARDWARE AND SOFTWARE MECHANISMS

by AdityaMahajan

Android phones have flash and have very limited internal memory which makes it difficult for Forensic Investigators to retrieve deleted data. However acquiring the data through physical acquisition increases the chances of extractingthe deleted data like SMS, call logs, contacts, etc. Also, Android phones are very secure phones, so retrieving data frominternal memory of Android phones under a forensically sound processis possible using hardware extraction tools like Cellebrite UFED or XRY.

5. Comparative research of techniques on BlackBerry OS (incl. PlayBook) and Android OS

by Yury Chemerkin

At present, the BlackBerry holds the palm of insufficient security examination despite of existing approaches more than Android but all security techniques implemented in these mobile devices are indecisive argument on security. Forensics tools may give incredible opportunity to gain all kind of data but there are too many slight objections.

6POTENTIAL IDENTITY THEFT OVER APPLE’S iOS DEVICES

by Shaikh Javed Hasan Nisar Ahmed

In our day to day life cycle, the demand of mobile phone increased immensely with boundless number of applications and services. The success of Apple’s corporation evidently shows the growing popularity of new generation wireless computing. Hence as the mobile computing had become the part of everyday life of billions of people all around the world, and thus matter of fact, mobile platform is also the biggest target of new generation cybercrimes

7. CELLEBRITE A “STANDARD” IN MOBILE FORENSICS

By Elias Psyllos

As the world of Digital Forensics continues to evolve in the Mobile device sector, one tool that has proven to be reliable is the Cellebrite UFED system.

Unlike computers, where the types of operating systems (Windows based, Mac based, Linux based, etc.) are limited in variations, mobile devices have a wide range of operating systems. This creates one of the biggest challenges in Mobile Forensics.

8. TALKING ABOUT TECHNO LAW – INTERVIEW WITH BENJAMIN WRIGHT

by Vaman Amarjeet

9. HOW TO ADDRESS END USER RISK AGREEMENT FOR BYOD by Adesanya Ahmed MBA, CRISC, CGEIT, ACPA, ACMA

Wi-Fi is quickly becoming the primary network connection of choice for workers everywhere. It is now a “must-have” technology for organizations, regardless of how large or small. So much so that a growing number of organizations — from colleges to corporations — have begun adopting bring-your- own-device (BYOD) policies. “The movement to allow a staff member or student to gain access to a network with their personal devices has become very popular.

10. Successful Practices for Bring Your Own Device (BYOD), Data Protection and Your Organization. Interview: Elizabeth Rogers

11. LET’S TALK ABOUT SECURITY – interviews with ‘Network Security” speakers

As a proud Official Media Partner of Network Security we would like to draw your attention to this must attend event for anyone working in security and present you interviews with some of the speakers.


Download
File
eForensics_04_2013.pdf

July 30, 2021
Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023