Reference architecture for android applications to support the detection of manipulated evidence

Copyright: 2016 South African Institute of Electrical Engineers.For access to the full text item, please consult the publisher's website. The definitive version of the work is published in the SAIEE Africa Research Journal (Transactions of the South African Institute of Electrical Engineers)107, pp92–103

[1]  Gaurav Gupta,et al.  Preserving Dates and Timestamps for Incident Handling in Android Smartphones , 2014, IFIP Int. Conf. Digital Forensics.

[2]  Michael W. Godfrey,et al.  A reference architecture for Web browsers , 2005, 21st IEEE International Conference on Software Maintenance (ICSM'05).

[3]  Felix C. Freiling,et al.  Forensic Analysis of YAFFS2 , 2012, Sicherheit.

[4]  Marnix Kaart,et al.  Android forensics: Interpretation of timestamps , 2014, Digit. Investig..

[5]  Muhammad Faheem,et al.  Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial Tool , 2014 .

[6]  Gaurav Gupta,et al.  Forensic-Ready Secure iOS Apps for Jailbroken iPhones , 2015, IFIP Int. Conf. Digital Forensics.

[7]  David A. Marca,et al.  SADT: structured analysis and design technique , 1987 .

[8]  Gary C. Kessler,et al.  Android forensics: Simplifying cell phone examinations , 2010 .

[9]  Sahin Albayrak,et al.  Smartphone malware evolution revisited: Android next target? , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).

[10]  Ramandeep Singh,et al.  CSLA — An application using Android Capstone project , 2014, 2014 IEEE International Conference on MOOC, Innovation and Technology in Education (MITE).

[11]  Sunguk Lee Creating and Using Databases for Android Applications , 2012 .

[12]  Harald C. Gall,et al.  Software architecture recovery of a program family , 1998, Proceedings of the 20th International Conference on Software Engineering.

[13]  Xiangling Fu,et al.  Research on Architecture of Multimedia and Its Design Based on Android , 2010, 2010 International Conference on Internet Technology and Applications.

[14]  Sangjin Lee,et al.  A recovery method of deleted record for SQLite database , 2011, Personal and Ubiquitous Computing.

[15]  Eghosa Ugboma Learn Database Programming Using SQL of MS Access 2007: Easy Transition to other SQL Platforms , 2007 .

[16]  Felix C. Freiling,et al.  Forensic Analysis of Smartphones: The Android Data Extractor Lite (ADEL) , 2011 .

[17]  Ryan Harris,et al.  Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem , 2006, Digit. Investig..

[18]  Jin-Soo Kim,et al.  Tuning the Ext4 Filesystem Performance for Android-Based Smartphones , 2011, ICFCE.

[19]  Heloise Pieterse,et al.  Smartphones as Distributed Witnesses for Digital Forensics , 2014, IFIP Int. Conf. Digital Forensics.

[20]  Luís Nogueira,et al.  Evaluating Android OS for Embedded Real-Time Systems , 2010 .

[21]  Douglas T. Ross,et al.  Software design using: SADT , 1977, ACM Annual Conference.

[22]  练启光 Android , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[23]  Richard C. Holt,et al.  A reference architecture for Web servers , 2000, Proceedings Seventh Working Conference on Reverse Engineering.