A forensics method for android devices based on the technique of temporary root
暂无分享,去创建一个
Nowadays, Android devices become more and more popular, which attracts the attention of the forensics workers. As Android devices have a perfect security mechanism, the root privileges of Android devices are required to obtain electronic evidence effectively. The existing methods of obtaining the root privileges in Android devices mainly based on the third-party tool. Although the methods are widely used, the drawback of this root method based on the third-party tools is uncontrollable. In this article, a temporary root method is presented. It is based on the vulnerabilities of the Android system. Moreover, this root method is applied to the acquisition of the physical images for Android devices. This root method utilizes an appropriate strategy and the vulnerabilities of the Android system to acquire the root privileges effectively. In the course of practice, this root method has the advantages of completely controllable and convenient.
[1] Sangjin Lee,et al. A study of user data integrity during acquisition of Android devices , 2013, Digit. Investig..
[2] Andrew Hoog. Android forensics : investigation, analysis, and mobile security for Google Android / Andrew Hoog ; John McCash, technical editor. , 2011 .
[3] Nicolas Christin,et al. Toward a general collection methodology for Android devices , 2011, Digit. Investig..
[4] Taejoo Chang,et al. New acquisition method based on firmware update protocols for Android smartphones , 2015, Digit. Investig..