Digital Forensics: Implementation and Analysis for Google Android Framework

Google Android forensics is a piece of digital forensics that offers many opportunities and challenges. Taking at the volume of newer Android devices and the abuse of these devices by criminals introduced challenges how to adequately extract and examine the information for forensic purposes. An exceptionally itemized comprehension of both the stage and forensic tools is required for procurement and examination of versatile information. There are various instruments on making smartphone crime scene investigation simpler. This research venture assesses the main instruments accessible in the market that back Android gadgets against its capacity to remove and analyze the information on numerous parameters. Acquiring data from a Google Android mobile is presently a critical issue in many criminal investigations. Android mobile can contain a lot of data, which can be useful in an investigation. These include typical Android device information such as SMS, browser history and searches, call log data, and device accounts. This proposed research focuses on the implementation, analysis, and performance of Google Android mobile forensic software and results of the finding. We have presented our research finding after execution of forensic procedures. However, during the proposed study, the artifacts obtained are applicable to use as evidences in the court of law against any criminal incident.

[1]  Justin Grover Android forensics: Automated data collection and reporting from a mobile device , 2013 .

[2]  Mark Pollitt,et al.  Computer Forensics Education , 2003, IEEE Secur. Priv..

[3]  Mohammad Hammoudeh,et al.  Forensic Data Recovery from Android OS Devices: An Open Source Toolkit , 2013, 2013 European Intelligence and Security Informatics Conference.

[4]  Xiaohui Tao,et al.  ICTs and the Millennium Development Goals , 2014, Springer US.

[5]  Rafael Timóteo de Sousa Júnior,et al.  Acquisition and Analysis of Digital Evidence in Android Smartphones , 2011 .

[6]  Yitao Yang,et al.  Dump and analysis of Android volatile memory on Wechat , 2015, 2015 IEEE International Conference on Communications (ICC).

[7]  Adam Shortall,et al.  Forensic Acquisitions of WhatsApp Data on Popular Mobile Platforms , 2015, 2015 Sixth International Conference on Emerging Security Technologies (EST).

[8]  Andrew Marrington,et al.  A Comparison of Forensic Acquisition Techniques for Android Devices: A Case Study Investigation of Orweb Browsing Sessions , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).

[9]  Neha S Thakur,et al.  Forensic Analysis of WhatsApp on Android Smartphones , 2013 .

[10]  Sangjin Lee,et al.  Digital forensic investigation of cloud storage services , 2012, Digit. Investig..

[11]  Hui Zhao,et al.  MMSnap: An MMS based forensic system for recovering stolen phones , 2015, 2015 IEEE 5th International Conference on Electronics Information and Emergency Communication.

[12]  Chung-Huang Yang,et al.  Design and Implementation of Live SD Acquisition Tool in Android Smart Phone , 2011, 2011 Fifth International Conference on Genetic and Evolutionary Computing.

[13]  Fazeel Ali Awan Forensic examination of social networking applications on smartphones , 2015, 2015 Conference on Information Assurance and Cyber Security (CIACS).

[14]  Qian Li,et al.  Database management strategy and recovery methods of Android , 2014, 2014 IEEE 5th International Conference on Software Engineering and Service Science.