Abstract
The high utilization rate of mobile devices highlights the problem of vulnerability. As a result, new cybercrime techniques are created, in response to which new forensic techniques must be created, so we can deduct the importance of this paper. For some years now, there has been a significant growth in the use of mobile devices in daily life, since they allow to carry personal data in a practical, easy and comfortable way. These data are, in many cases, the target of malicious people, who, taking advantage of the vulnerabilities that these devices present, are capable of illegal actions, usually for unlawful purposes. The current research proposes, using a comparative method to allow us to formulate a forensic analysis to mobile devices with Android operating system; based on the chain of custody guidelines, compliance stages, and phases and to detect findings, nonconformities, locate vulnerabilities. Based on this process we can determine the origin of the leading causes of different types of events or crimes committed from a mobile device. Additionally, using a decision matrix, the best software for performing the forensic analysis is chosen and using Balanced Scorecard, indicators are evaluated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yıldırım, N., Varol, A.: Android based mobile application development for web login authentication using fingerprint recognition feature. In: 2015 23th Signal Processing and Communications Applications Conference (SIU). https://doi.org/10.1109/siu.2015.7130436
Venkateswara Rao, V., Chakravarthy, A.S.N.: Forensic analysis of Android mobile devices. In: 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE), 23–25 December 2016. https://doi.org/10.1109/icraie.2016.7939540
Roger, M., Seigfried, K.: The future of computer forensics: a needs analysis survey. Cent. Educ. Res. Inf. Assur. Secur. 23(1), 12–16 (2004)
Höbarth, S.: A framework for on-device privilege escalation exploit. In: de IWSSI2011, San Francisco (2011). https://www.wibas.com/cmmi/decision-analysis-and-resolution-dar-cmmi-dev
El Confidencial: https://goo.gl/WjSVoF. Accessed 17 Mar 2017
Ting, W.: Applying the balanced score card in the team strategic performance management. In: 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), 8–10 August 2011. https://doi.org/10.1109/aimsec.2011.6010534
OWASP: https://goo.gl/OS4fdM. Accessed 01 Feb 2017
Zander, T.: https://www.tobiaszander.de/. Accessed 08 Aug 2017
Vidas, et al.: Toward a general collection methodology for Android devices. In: The Proceedings of the Eleventh Annual DFRWS Conference, vol. 8, pp. S14–S24, Carnegie Mellon ECE/CyLab, USA
Stiparo, P., Kounelis, I.: The mobileak project: forensics methodology for mobile application privacy assessment. In: International Conference for Internet Technology and Secured Transactions. IEEE
Gómez, E, Herrera, N, Moscoso O, Guaman, P.: Propuesta de Análisis Forense para Dispostivos Móviles con Sistema Operativo Android. https://goo.gl/MSQ1Ua
NIST: National Institute of Standards and Technology, 3 April 2014. http://www.nist.gov/. Accessed 6 Apr 2014
The Process Group: Decision Analysis & Resolution, 18 February 2014. http://www.processgroup.com/
Santoku: Santoku. Obtenido de, 17 de 03 de 2017. https://santoku-linux.com/
Oxigen Forensic: Oxigen Forensic Suite. http://www.oxygen-forensic.com/es/
Andriller Tool: https://www.andriller.com/
Guidances Software: Encase Forensic.https://www.guidancesoftware.com/encase-forensic?cmpid=nav_r
Li, B., Wang, Y.: Study on the enterprise strategic budget management mode based on balance scored card. In: 2010 International Conference on E-Business and E-Government (ICEE), 7–9 May 2010. https://doi.org/10.1109/icee.2010.707
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Gomez-Torres, E., Moscoso-Zea, O., Herrera, N.H., Lujan-Mora, S. (2018). Towards a Forensic Analysis of Mobile Devices Using Android. In: Rocha, Á., Guarda, T. (eds) Proceedings of the International Conference on Information Technology & Systems (ICITS 2018). ICITS 2018. Advances in Intelligent Systems and Computing, vol 721. Springer, Cham. https://doi.org/10.1007/978-3-319-73450-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-73450-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-73449-1
Online ISBN: 978-3-319-73450-7
eBook Packages: EngineeringEngineering (R0)